Description
A vulnerability was detected in Chia Blockchain 2.1.0. Impacted is an unknown function of the file /send_transaction. The manipulation results in cross-site request forgery. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
Published: 2026-02-25
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Assess Impact
AI Analysis

Impact

An attacker can submit crafted requests to the /send_transaction endpoint of Chia Blockchain, leading to unauthorized execution of blockchain transactions. The flaw is a cross‑site request forgery that allows a malicious actor to make the node perform actions on behalf of a legitimate user or owner of that node. While the vulnerability is hard to exploit and requires sophisticated manipulation, it could compromise the integrity of the blockchain if successful, allowing fraudulent transfers.

Affected Systems

The vulnerability affects the Chia Blockchain client, specifically version 2.1.0. No other versions are listed as affected, and the vendor has not reported additional impacted releases.

Risk and Exploitability

The CVSS score of 2.3 indicates a low overall severity. The EPSS score of less than 1% shows that the likelihood of exploitation is very small at present. The vulnerability has not been identified as a known exploited vulnerability by CISA. The attack requires remote access to the node’s RPC endpoint, and the exploitation is considered difficult, but since the exploit is public, the risk remains moderate as it could be leveraged by determined attackers with sufficient knowledge.

Generated by OpenCVE AI on April 16, 2026 at 16:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict access to the Chia Blockchain RPC interface to trusted internal networks or use a VPN.
  • Configure the RPC service to require authentication tokens or client certificates to prevent unauthenticated requests.
  • Monitor for unexpected transaction activity and enable logging of RPC calls to detect potential CSRF attempts.

Generated by OpenCVE AI on April 16, 2026 at 16:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chia:blockchain:2.1.0:*:*:*:*:*:*:*

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Chia
Chia blockchain
Vendors & Products Chia
Chia blockchain

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Chia Blockchain 2.1.0. Impacted is an unknown function of the file /send_transaction. The manipulation results in cross-site request forgery. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
Title Chia Blockchain send_transaction cross-site request forgery
Weaknesses CWE-352
CWE-862
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:20:18.500Z

Reserved: 2026-02-25T09:35:41.634Z

Link: CVE-2026-3193

cve-icon Vulnrichment

Updated: 2026-02-27T18:20:14.520Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T17:25:42.937

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:15:08Z

Weaknesses