Unverified Contract uniswapV3Callback Lacking Access Control

From Quadriga Initiative Cryptocurrency Hacks, Scams, and Frauds Repository
Revision as of 15:45, 10 October 2025 by Azoundria (talk | contribs) (Created page with "{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/unverifiedcontractuniswapv3callbacklackingaccesscontrol.php}} {{Unattributed Sources}} thumb|Base Blockchain Logo/HomepageOn August 28th, 2025, an unverified smart contract was deployed on the Base blockchain containing a critical vulnerability: the uniswapV3SwapCallback function lacked proper access control. This allowed an attacker to exploit the contract u...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Notice: This page is a freshly imported case study from an original repository. While the original content had a similar format, some sections may not have been fully completed. Please help fill in any empty sections or any missing information you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.

Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!

Base Blockchain Logo/Homepage

On August 28th, 2025, an unverified smart contract was deployed on the Base blockchain containing a critical vulnerability: the uniswapV3SwapCallback function lacked proper access control. This allowed an attacker to exploit the contract using a delegatecall to another contract, resulting in a reported loss of approximately $88.9K. The incident was first analyzed and reported by TenArmor and researcher Weilin (William) Li, and later included in Blockthreat’s Week 36 report. The responsible project remains unidentified, and there is currently no indication of an ongoing investigation or recovery efforts.[1][2][3][4][5][6][7][8][9]

About Unverified Contract

An unverified smart contract was launched on the Base blockchain on August 28th, 2025.

This invokes code in another smart contract via a delegatecall.

The Reality

Unfortunately, the smart contract was launched with a vulnerability where the uniswapV3Callback function lacked access control.

What Happened

An unverified smart contract on the Base blockchain was exploited due to a missing access control in the uniswapV3SwapCallback function, resulting in a reported loss of $88.9K.

Key Event Timeline - Unverified Contract uniswapV3Callback Lacking Access Control
Date Event Description
August 28th, 2025 3:35:11 PM MDT Victim Smart Contract Launched The victim smart contract is first launched on the Base blockchain.
August 29th, 2025 5:55:05 AM MDT Delegated Smart Contract Launched The smart contract starting with 0x1d9e is launched, containing a vulnerability due to the lack of access control on uniswapV3Callback.
September 1st, 2025 12:38:27 AM MDT Base Attack Transaction The attack is accepted into the Base blockchain.
September 1st, 2025 1:13:00 AM MDT TenArmor Tweet Posted TenArmor posts a tweet with details about the xploit.

Technical Details

According to an initial analysis by TenArmor, "[i]t appears that the uniswapV3SwapCallback function of the contract 0x1d9e lacks access control, which was exploited by the attacker."

Total Amount Lost

TenArmor has reported that there was "an approximately loss of $88.9K".

The total amount lost has been estimated at $89,000 USD.

Immediate Reactions

The incident was reported by TenArmor and researcher Weilin (William) Li.

Ultimate Outcome

It appears that the incident was included in the Blockthreat report for Week 36 of 2025.

Total Amount Recovered

There is limited information available about the smart contract, and no suggestion that any recovery is presently being attempted.

There do not appear to have been any funds recovered in this case.

Ongoing Developments

It's unclear which project is behind this address, and whether any investigation is underway.

Individual Prevention Policies

No specific policies for individual prevention have yet been identified in this case.

For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.

Platform Prevention Policies

Policies for platforms to take to prevent this situation have not yet been selected in this case.

For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.

Regulatory Prevention Policies

No specific regulatory policies have yet been identified in this case.

For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.

References