DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-40069: CVE-2026-40069: Integrity Verification Failure in BSV Ruby SDK ARC Broadcaster

CVE-2026-40069: Integrity Verification Failure in BSV Ruby SDK ARC Broadcaster

Vulnerability ID: CVE-2026-40069
CVSS Score: 7.5
Published: 2026-04-09

The bsv-sdk Ruby package versions 0.1.0 through 0.8.1 contain a high-severity logic flaw in the Application Registry Connector (ARC) broadcaster implementation. The SDK fails to correctly parse terminal failure statuses returned by ARC nodes, causing applications to accept failed or malformed transactions as successfully broadcasted.

TL;DR

A failure-state validation flaw in bsv-sdk's ARC broadcaster allows attackers to spoof successful transaction broadcasts by submitting malformed or orphan transactions, leading to potential financial discrepancies.


⚠️ Exploit Status: POC

Technical Details

  • CWE ID: CWE-754
  • CVSS Score: 7.5
  • Attack Vector: Network
  • Integrity Impact: High
  • Exploit Status: PoC
  • KEV Listed: False

Affected Systems

  • bsv-sdk Ruby package versions 0.1.0 through 0.8.1
  • Wallet backends utilizing ARC broadcast functionality
  • Merchant payment gateways integrating bsv-sdk
  • bsv-sdk: >= 0.1.0, < 0.8.2 (Fixed in: 0.8.2)

Code Analysis

Commit: 4992e8a

Fix ARC failure state parsing and add ORPHAN detection

Mitigation Strategies

  • Upgrade bsv-sdk to version 0.8.2 or later.
  • Implement secondary transaction verification checks via RPC or block explorers.

Remediation Steps:

  1. Update the Gemfile to specify gem 'bsv-sdk', '>= 0.8.2'
  2. Execute 'bundle install' to fetch the updated package
  3. Restart the application server to load the new library code into memory
  4. Verify system logs for anomalous transaction failures

References


Read the full report for CVE-2026-40069 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)