CVE-2025-57247

The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() functions in the base ERC20 contract are declared as public without proper access control modifiers, allowing any user to bypass transfer restrictions and manipulate special address settings. This enables unauthorized users to circumvent cold time transfer restrictions and potentially disrupt dividend distribution mechanisms, leading to privilege escalation and violation of the contract's intended tokenomics.
Configurations

No configuration.

History

06 Oct 2025, 18:15

Type Values Removed Values Added
CWE CWE-284
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

06 Oct 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-06 17:16

Updated : 2025-10-06 18:15


NVD link : CVE-2025-57247

Mitre link : CVE-2025-57247

CVE.ORG link : CVE-2025-57247


JSON object : View

Products Affected

No product.

CWE
CWE-284

Improper Access Control