Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3193: Cross-Site Request Forgery in Chia Blockchain

0
Low
VulnerabilityCVE-2026-3193cvecve-2026-3193
Published: Wed Feb 25 2026 (02/25/2026, 16:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Chia
Product: Blockchain

Description

A vulnerability was detected in Chia Blockchain 2.1.0. Impacted is an unknown function of the file /send_transaction. The manipulation results in cross-site request forgery. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".

AI-Powered Analysis

AILast updated: 02/25/2026, 21:58:31 UTC

Technical Analysis

CVE-2026-3193 identifies a cross-site request forgery (CSRF) vulnerability in Chia Blockchain version 2.1.0, specifically within the /send_transaction endpoint. CSRF vulnerabilities occur when a web application does not properly verify that requests originate from legitimate users, allowing attackers to trick authenticated users into unknowingly submitting malicious requests. In this case, the vulnerability could allow a remote attacker to cause a user to send unauthorized blockchain transactions by exploiting the lack of adequate anti-CSRF protections. The attack complexity is high, requiring crafted requests and user interaction, which reduces the likelihood of successful exploitation. The vulnerability does not require authentication but does require the user to interact with a malicious site or content. The vendor has rejected a bug bounty report citing that this behavior is by design, emphasizing that users are responsible for securing their hosts. No patches or fixes have been released, and no known exploits are currently active in the wild. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity, resulting in a low overall severity score of 2.3. This vulnerability primarily threatens transaction integrity by potentially enabling unauthorized transactions, but the difficulty of exploitation and user interaction requirement limit its practical impact.

Potential Impact

The primary impact of CVE-2026-3193 is on the integrity of blockchain transactions within affected Chia Blockchain nodes. An attacker could trick users into unknowingly submitting unauthorized transactions, potentially resulting in financial loss or unintended asset transfers. However, the high complexity and requirement for user interaction significantly reduce the risk of widespread exploitation. Confidentiality and availability impacts are minimal, as the vulnerability does not expose sensitive data or disrupt service availability. Organizations relying on Chia Blockchain 2.1.0 may face targeted attacks aimed at manipulating transactions, especially if users are tricked into visiting malicious websites or clicking crafted links. The vendor's stance that host security is the user's responsibility means that endpoint security failures could exacerbate the risk. Overall, the threat is limited but should not be ignored in environments where transaction integrity is critical.

Mitigation Recommendations

To mitigate CVE-2026-3193, organizations should implement several specific measures beyond generic advice: 1) Employ strict Content Security Policy (CSP) headers to restrict the sources of executable scripts and reduce the risk of malicious cross-site requests. 2) Use browser security features such as SameSite cookies set to 'Strict' or 'Lax' to prevent cookies from being sent with cross-site requests. 3) Educate users to avoid clicking on suspicious links or visiting untrusted websites while logged into Chia Blockchain interfaces. 4) Implement network-level protections such as web application firewalls (WAFs) to detect and block suspicious CSRF attempts targeting the /send_transaction endpoint. 5) Monitor blockchain transaction logs for unusual or unauthorized transactions to enable rapid detection and response. 6) Consider isolating blockchain transaction interfaces from general web browsing environments, for example by using dedicated browsers or virtual machines. 7) Stay informed about updates from the vendor and apply patches promptly if they become available. 8) Enforce endpoint security best practices, including up-to-date antivirus, anti-malware, and system hardening to reduce the risk of host compromise that could facilitate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-25T09:35:41.634Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6e70b7ef31ef0b5a0a10

Added to database: 2/25/2026, 9:49:36 PM

Last enriched: 2/25/2026, 9:58:31 PM

Last updated: 2/26/2026, 8:14:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats