Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hfcf-v2f8-x9pc | bitcoinj has a ScriptExecution P2PKH/P2WPKH Verification Bypass |
Fri, 15 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/script/ScriptExecution.java. In both branches, bitcoinj verifies an attacker-controlled signature/public-key pair but fails to verify that the public key is the one committed to by the output being spent. As a result, any attacker keypair can satisfy bitcoinj's local verification for arbitrary P2PKH and P2WPKH outputs. This vulnerability is fixed in 0.17.1. | |
| Title | bitcoinj: ScriptExecution P2PKH/P2WPKH Verification Bypass | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-16T01:13:51.811Z
Reserved: 2026-05-07T17:07:09.318Z
Link: CVE-2026-44714
No data.
Status : Received
Published: 2026-05-15T17:16:47.933
Modified: 2026-05-15T17:16:47.933
Link: CVE-2026-44714
No data.
OpenCVE Enrichment
Updated: 2026-05-15T18:30:05Z
Github GHSA