GMX: $40 million attack stems from reentrancy vulnerability in OrderBook contract

2025/07/10 23:53

PANews reported on July 10 that GMX officially disclosed the reasons and follow-up measures for the attack of about $40 million on the Arbitrum chain on July 9 on GMX V1. According to the analysis of the security team, the attack originated from the reentrancy vulnerability of the OrderBook contract. The hacker used the vulnerability to manipulate the average price of BTC short positions, thereby significantly raising the price of GLP and arbitrage. The official has suspended transactions related to the Avalanche chain, confirmed that the V2 version is not affected, and will take measures such as disabling GLP casting and redemption and setting up a compensation pool. GMX reminds V1 fork projects to promptly repair similar risks.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.