A vulnerability was detected in Chia Blockchain 2.1.0. Impacted is an unknown function of the file /send_transaction. The manipulation results in cross-site request forgery. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
References
| Link | Resource |
|---|---|
| https://github.com/Danimlzg/chia-rpc-auth-bypass.git | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.347749 | Permissions Required VDB Entry |
| https://vuldb.com/?id.347749 | Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2026, 00:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Chia
Chia blockchain |
|
| References | () https://github.com/Danimlzg/chia-rpc-auth-bypass.git - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.347749 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.347749 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:chia:blockchain:2.1.0:*:*:*:*:*:*:* |
25 Feb 2026, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 17:25
Updated : 2026-03-05 00:59
NVD link : CVE-2026-3193
Mitre link : CVE-2026-3193
CVE.ORG link : CVE-2026-3193
JSON object : View
Products Affected
chia
- blockchain
