Vulnerability Description
A security vulnerability has been detected in Chia Blockchain 2.1.0. This issue affects the function _authenticate of the file rpc_server_base.py of the component RPC Credential Handler. The manipulation leads to improper authentication. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chia | Blockchain | 2.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/Danimlzg/chia-rpc-auth-bypass.gitExploitThird Party Advisory
- https://vuldb.com/?ctiid.347748Permissions RequiredVDB Entry
- https://vuldb.com/?id.347748Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3192?
CVE-2026-3192 is a vulnerability with a CVSS score of 5.6 (MEDIUM). A security vulnerability has been detected in Chia Blockchain 2.1.0. This issue affects the function _authenticate of the file rpc_server_base.py of the component RPC Credential Handler. The manipulat...
How severe is CVE-2026-3192?
CVE-2026-3192 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3192?
Check the references section above for vendor advisories and patch information. Affected products include: Chia Blockchain.