Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3193: Cross-Site Request Forgery in Chia Blockchain

0
Low
VulnerabilityCVE-2026-3193cvecve-2026-3193
Published: Wed Feb 25 2026 (02/25/2026, 16:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Chia
Product: Blockchain

Description

A vulnerability was detected in Chia Blockchain 2.1.0. Impacted is an unknown function of the file /send_transaction. The manipulation results in cross-site request forgery. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:51:41 UTC

Technical Analysis

CVE-2026-3193 identifies a cross-site request forgery vulnerability in the Chia Blockchain software version 2.1.0, specifically within an unspecified function tied to the /send_transaction endpoint. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting unintended requests to a web application, leveraging the user's active session and privileges. In this case, the vulnerability could allow a remote attacker to cause a user to unknowingly initiate blockchain transactions without their consent. The attack complexity is high due to the need for user interaction and crafting specific requests, and no authentication is required by the attacker, though the victim must be authenticated. The vendor's stance is that this behavior is by design, emphasizing user responsibility for host security, which suggests that no immediate patch or fix is planned. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:P), and low impact on integrity (VI:L), with no impact on confidentiality or availability. This results in a low overall severity score of 2.3. While no known exploits are currently in the wild, the public availability of the exploit details means attackers could develop proof-of-concept attacks. The vulnerability highlights the importance of CSRF protections in blockchain transaction endpoints, especially those exposed via web interfaces.

Potential Impact

The primary impact of this vulnerability is the potential unauthorized initiation of blockchain transactions by tricking authenticated users into submitting malicious requests. This could lead to unintended transfer of assets or manipulation of blockchain state, potentially causing financial loss or disruption of operations relying on Chia Blockchain. However, the high complexity and requirement for user interaction limit the likelihood of widespread exploitation. The low CVSS score reflects limited confidentiality and availability impact, with only low integrity impact. Organizations relying on Chia Blockchain 2.1.0 may face risks if users are tricked into interacting with malicious sites, especially in environments where host security is weak. The lack of vendor patching means organizations must rely on compensating controls. While no active exploits are known, the public disclosure increases the risk of future attacks. Overall, the impact is moderate for organizations with exposed user interfaces and less secure user environments, but limited for hardened or isolated deployments.

Mitigation Recommendations

To mitigate this CSRF vulnerability, organizations should implement strict CSRF protections on the /send_transaction endpoint and any other transaction-related interfaces. This includes using anti-CSRF tokens that are validated on the server side for every state-changing request. Additionally, enforcing same-site cookies with the 'Strict' or 'Lax' attribute can reduce CSRF risks by limiting cookie transmission to same-site contexts. User education is critical to avoid interaction with untrusted sites while authenticated to the blockchain interface. Network segmentation and host hardening can reduce the risk of compromise. Monitoring and logging transaction requests for unusual patterns may help detect exploitation attempts. If possible, upgrading to a newer version of Chia Blockchain that addresses this issue or applying vendor patches when available is recommended. In the absence of vendor fixes, deploying web application firewalls (WAFs) with custom rules to detect and block CSRF attempts can provide additional protection. Finally, restricting access to the blockchain interface to trusted networks or VPNs can limit exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-25T09:35:41.634Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6e70b7ef31ef0b5a0a10

Added to database: 2/25/2026, 9:49:36 PM

Last enriched: 3/5/2026, 9:51:41 AM

Last updated: 4/13/2026, 11:34:33 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses