Description
A flaw has been found in Chia Blockchain 2.1.0. The affected element is the function send_transaction/get_private_key of the component RPC Server Master Passphrase Handler. This manipulation causes missing authentication. The attack can only be executed locally. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been published and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
Published: 2026-02-25
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized local private key disclosure
Action: Apply patch
AI Analysis

Impact

A flaw in Chia Blockchain 2.1.0 allows an attacker with local access to bypass authentication in the RPC Server Master Passphrase Handler and retrieve a private key. The vulnerability is classified as CWE‑287 and CWE‑306. The description states that the attack has high complexity and is difficult to exploit, yet an exploit has been published. If successful, the attacker can recover the private key used by the wallet.

Affected Systems

Chia Blockchain version 2.1.0 is affected. No other versions or products are listed as impacted.

Risk and Exploitability

The CVSS score is 2, indicating low severity, and the EPSS score is under 1%, meaning exploitation is unlikely. The vulnerability is not in the CISA KEV catalog. The attack vector is local only, so it requires the attacker to have host access to a running Chia node with the RPC server enabled.

Generated by OpenCVE AI on April 18, 2026 at 10:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Chia Blockchain release that contains a fix for this authentication bypass
  • If immediate upgrade is not possible, restrict the RPC server to trusted hosts or disable it entirely on untrusted machines
  • Continuously audit wallet activity and RPC logs for signs of unauthorized private key usage

Generated by OpenCVE AI on April 18, 2026 at 10:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chia:blockchain:2.1.0:*:*:*:*:*:*:*

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Chia
Chia blockchain
Vendors & Products Chia
Chia blockchain

Wed, 25 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Chia Blockchain 2.1.0. The affected element is the function send_transaction/get_private_key of the component RPC Server Master Passphrase Handler. This manipulation causes missing authentication. The attack can only be executed locally. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been published and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
Title Chia Blockchain RPC Server Master Passphrase get_private_key missing authentication
Weaknesses CWE-287
CWE-306
References
Metrics cvssV2_0

{'score': 3.5, 'vector': 'AV:L/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.5, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T18:43:40.383Z

Reserved: 2026-02-25T09:35:44.539Z

Link: CVE-2026-3194

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T18:23:42.810

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:45:43Z

Weaknesses