Description
@web3-react is a framework for building Ethereum Apps . In affected versions the `chainId` may be outdated if the user changes chains as part of the connection flow. This means that the value of `chainId` returned by `useWeb3React()` may be incorrect. In an application, this means that any data derived from `chainId` could be incorrect. For example, if a swapping application derives a wrapped token contract address from the `chainId` *and* a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping. This issue has been addressed in PR #749 and is available in updated npm artifacts. There are no known workarounds for this issue. Users are advised to upgrade.
Remediation
References
https://github.com/Uniswap/web3-react/pull/749
https://github.com/Uniswap/web3-react/security/advisories/GHSA-8pf3-6fgr-3g3g
Related Vulnerabilities
CVE-2022-31183 Vulnerability in maven package co.fs2:fs2-io_sjs1_2.12
CVE-2023-33008 Vulnerability in maven package org.apache.johnzon:johnzon
CVE-2021-23470 Vulnerability in npm package putil-merge
CVE-2023-45669 Vulnerability in maven package com.webauthn4j:webauthn4j-spring-security-core
CVE-2023-25761 Vulnerability in maven package org.jenkins-ci.plugins:junit