{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3194","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-25T09:35:44.539Z","datePublished":"2026-02-25T17:02:17.420Z","dateUpdated":"2026-02-25T18:43:40.383Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-25T17:02:17.420Z"},"title":"Chia Blockchain RPC Server Master Passphrase get_private_key missing authentication","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-306","lang":"en","description":"Missing Authentication"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-287","lang":"en","description":"Improper Authentication"}]}],"affected":[{"vendor":"Chia","product":"Blockchain","versions":[{"version":"2.1.0","status":"affected"}],"modules":["RPC Server Master Passphrase Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Chia Blockchain 2.1.0. The affected element is the function send_transaction/get_private_key of the component RPC Server Master Passphrase Handler. This manipulation causes missing authentication. The attack can only be executed locally. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been published and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason \"This is by design. The user is responsible for host security\"."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2,"vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":4.5,"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.5,"vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":3.5,"vectorString":"AV:L/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-25T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-25T10:40:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"DeSneake (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347750","name":"VDB-347750 | Chia Blockchain RPC Server Master Passphrase get_private_key missing authentication","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347750","name":"VDB-347750 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.757201","name":"Submit #757201 | Chia Network Chia Blockchain Chia Blockchain 2.1.0 (confirmed vulnerable) Later versions (2.2.0 - 2.5.6) presumed vulnerable - no fix released Authentication Bypass/CSRF/Cryptographic Issue","tags":["third-party-advisory"]},{"url":"https://github.com/Danimlzg/chia-rpc-auth-bypass.git","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-25T18:43:30.844423Z","id":"CVE-2026-3194","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-25T18:43:40.383Z"}}]}}