
Security research firm Common Prefix previously reported two serious security vulnerabilities in the XRP Ledger (XRPL) to the Ripple team. Both vulnerabilities involve the validation nodes’ handling of the consensus mechanism for transaction sets. If a validation node in the Unique Node List (UNL) is compromised, an attacker can send malicious messages, causing a chain reaction of validation node crashes. The related fixes have been integrated into rippled version 3.0.0.

XRPL’s consensus mechanism requires validation nodes to agree on a set of transactions. Each node proposes known unprocessed transactions, and through message exchanges, they reach final consensus on the transaction set. The root cause of both vulnerabilities lies in a flaw in the rippled code’s logic for handling “disputed transactions” (transactions that differ between validation nodes’ transaction sets).
The attack premise involves infiltrating approximately 35 validation nodes in the UNL. Although UNL validation nodes are typically hidden behind proxy nodes and only communicate with them, making infiltration more difficult, Common Prefix researcher Nikolaos Kamarinakis points out that it’s not impossible. Once compromised, an attacker can deploy modified rippled tools to continuously send malicious messages to other validation nodes until the compromised node is removed from the UNL.
Vulnerability 1 — Comparing Transactions: A compromised validation node claims a transaction exists in the SHAMap on a node where it does not. Other nodes attempting to find the transaction ID using an invalid node ID will crash immediately.
Fix 1: Added a verification step to confirm whether the transaction truly exists on the specified node in the proposal, blocking the crash triggered by invalid IDs.
Vulnerability 2 — Relaying Transactions: A compromised validation node sends a malicious transaction set containing arbitrary hashes. Other nodes recognize it as a disputed transaction and attempt to forward it, causing a crash during the “fake transaction check” due to invalid data.
Fix 2: Introduced try-catch exception handling to catch exceptions triggered by malicious data, preventing the crash from propagating outward.
Ripple’s engineering team successfully reproduced both vulnerabilities in isolated test networks using independent verification tools and confirmed that after applying the fixes, nodes receiving malicious messages no longer crash.
The fixes for both vulnerabilities have been incorporated into rippled version 3.0.0. Ripple confirms that in testing environments, nodes with the fixes remain stable when facing the same attack vectors.
Ripple also announced a future roadmap for XRPL security strengthening, including expanding security audits to identify issues before code release, introducing AI-assisted code reviews to systematically detect potential vulnerabilities, hosting security hackathons, and increasing bug bounty rewards to encourage external security researchers to report issues proactively.
Ripple officially thanked Common Prefix in the report, acknowledging their responsible disclosure and full technical cooperation during the fix process.
An attack requires infiltrating about 35 validation nodes in the UNL. Since UNL validation nodes are usually hidden behind proxy nodes and only communicate with them, the attack surface is relatively limited. However, security researchers note that it’s not impossible, so fixing these vulnerabilities before they are publicly exploited is a necessary precaution.
All operators running rippled version 2.6.2 or earlier should upgrade to rippled 3.0.0 as soon as possible to fully protect against these two vulnerabilities. Versions prior to the upgrade are at risk of validation node chain crashes if an attacker infiltrates a UNL validation node.
This incident exemplifies a standard responsible security disclosure process—Common Prefix privately reported the issues in June 2025, and Ripple fixed them in rippled 3.0.0 before publicly disclosing in March 2026. Ripple’s announcement of a security enhancement roadmap, including AI-assisted code reviews and increased bug bounty rewards, demonstrates ongoing commitment to proactive security development.