Babylon contributors have disclosed a vulnerability in the BLS voting extension mechanism, affecting versions prior to 4.2.0.
TL;DR
A high-severity vulnerability in Babylon's BLS voting extension mechanism, disclosed on December 9, 2025, allows malicious validators to disrupt consensus by omitting block hashes, potentially slowing block production. It affects versions prior to 4.2.0, with no reported exploitations yet.
Tags
According to a Foresight News report, a Babylon GitHub post disclosed by contributor @GrumpyLaurie55348 on December 9, 2025, reveals a vulnerability in Babylon's BLS voting extension mechanism. This vulnerability could allow malicious validators to interfere with the network consensus process. An attacker could intentionally omit the block hash field when sending blocks, causing other validators to crash at network cycle boundaries, thus slowing down block production. The vulnerability is rated as high severity, affecting versions prior to 4.2.0. No user reports of exploitation have been received to date.