CVE-2026-44714: bitcoinj Library Flaw Allows Arbitrary P2PKH/P2WPKH Spends
The bitcoinj library, a Java implementation of the Bitcoin protocol, contains a critical vulnerability, CVE-2026-44714. Prior to version 0.17.1, two fast-path verification bugs existed in ScriptExecution.correctlySpends() for standard P2PKH and native P2WPKH transactions. This flaw, rated 7.5 (HIGH) by the National Vulnerability Database, enables an attacker to bypass critical public key verification.
Specifically, the National Vulnerability Database notes that bitcoinj incorrectly verifies attacker-controlled signature/public-key pairs without confirming that the public key corresponds to the committed output being spent. This means an attacker can use any keypair to satisfy bitcoinj’s local verification for arbitrary P2PKH and P2WPKH outputs. The implications are severe for any application relying on bitcoinj for transaction validation.
Defenders must recognize that this isn’t a theoretical flaw. It directly impacts the integrity of transaction verification within bitcoinj. Organizations using this library in cryptocurrency applications, exchanges, or wallets must upgrade to version 0.17.1 immediately. Failure to do so leaves their systems vulnerable to unauthorized transaction validation, potentially leading to asset loss or manipulation.
What This Means For You
- If your organization utilizes the bitcoinj library, you are directly exposed. This isn't just a bug; it's a fundamental bypass of transaction integrity. You need to immediately identify all instances of bitcoinj in your infrastructure and ensure they are patched to version 0.17.1 or higher. Audit any applications that rely on bitcoinj's transaction verification logic, as an attacker could have exploited this to validate illegitimate spends.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44714: bitcoinj Library Arbitrary Spend Attempt
title: CVE-2026-44714: bitcoinj Library Arbitrary Spend Attempt
id: scw-2026-05-15-ai-1
status: experimental
level: high
description: |
Detects potential exploitation of CVE-2026-44714 by identifying processes that load or interact with the bitcoinj library and specifically call the vulnerable ScriptExecution.correctlySpends() method. This indicates an attempt to leverage the flaw for arbitrary spends.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44714/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'bitcoinj'
CommandLine|contains:
- 'ScriptExecution.correctlySpends'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44714 | Auth Bypass | bitcoinj library versions prior to 0.17.1 |
| CVE-2026-44714 | Auth Bypass | ScriptExecution.correctlySpends() function in core/src/main/java/org/bitcoinj/script/ScriptExecution.java |
| CVE-2026-44714 | Auth Bypass | Fast-path verification bugs for standard P2PKH and native P2WPKH spends |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.