#0x1C

Missing Access Control Allows Unauthorized Root Escrow Funding

@coleflumpussubmitted a report toJupiterApril 7, 2026 at 23:06
Severity
INFORMATIONAL
CVSS
5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Vulnerability TypeImproper Access Control
AssetLocpQgucEQHbqNABEYvBvwoxCPsSbG91A1QaQhQQqjn - Jupiter Lock
Endpointhttps://github.com/jup-ag/jup-lock%20(programs/locker/src/instructions/root_escrow_instructions/fund_root_escrow.rs,%20lines%2035-75)

Description

Steps to Reproduce

Impact

Activity

raccoons
@raccoonsclosed the report asInformative
Apr 8

Hi @coleflumpus, Thank you for the report. We've reviewed this and are closing it as Informational. While it is correct that fund_root_escrow does not restrict callers to the escrow creator, this is by design and does not constitute an exploitable vulnerability: 1. The caller transfers tokens from their own wallet - there is no path to drain or redirect funds belonging to the escrow creator. 2. The funded amount is bounded by max_claim_amount - total_funded_amount, preventing overfunding beyond the intended cap. 3. The practical impact is a griefing vector that costs the attacker real tokens with no material benefit. Allowing permissionless funding is an intentional design choice to support use cases where multiple parties (e.g., DAOs, treasuries) may contribute to the same escrow. We appreciate you looking into this. While it doesn't meet the bar for a rewarded finding, we value your interest in the security of Jupiter Lock.

@raccoonschanged the severity frommediumtoinformational
6d ago
@raccoonsdisclosed this reportPublic Disclosure
4d ago