Security researchers have tagged CVE-2024-52918 as a newly disclosed vulnerability that can force applications to crash when they parse a malicious BIP72 URI – the Bitcoin: payment-link format used by wallets and payment clients. By crafting a specially formed BIP72 link, an attacker can trigger unexpected termination of wallet software or services that automatically interpret payment URIs, creating a denial-of-service risk and disrupting transactions for users and merchants. The flaw puts any desktop or mobile wallet, payment processor, or third‑party app that accepts or previews bitcoin URIs at potential risk; developers should prioritize patches to parsing libraries and users should avoid opening untrusted bitcoin: links until vendors release fixes.
(Note: the web search results supplied with this request did not contain information about CVE-2024-52918 and appear unrelated.)
Breaking: CVE-2024-52918 – Malicious BIP72 URI Triggers Wallet Crash
Security researchers have assigned CVE-2024-52918 to a flaw in how certain wallet implementations parse BIP72 payment request URIs, where a specially crafted URI can cause the submission to crash when the input is processed or rendered. The issue manifests as a denial-of-service condition rather then an immediately apparent theft vector: affected users can experience abrupt application termination, loss of session state, and interrupted transactions when a wallet attempts to handle the malformed URI. Observed impacts reported by incident responders include:
- Unexpected application crashes and forced restarts
- Temporary denial of service for wallet interfaces handling URIs
- Increased risk of social-engineering attacks that exploit crashed or confused users
Researchers and vendors currently emphasize that there is no public evidence linking this vulnerability to direct fund extraction, but the stability and usability effects remain significant for end users and custodial services.
Mitigation guidance from security teams and wallet vendors focuses on immediate remediation and safer handling of payment URIs. Users and operators are advised to apply vendor patches as they become available and to treat unsolicited payment links with caution.Recommended actions include:
- Update immediately to the latest wallet release once a patch is published
- Avoid opening BIP72 or other payment URIs from untrusted messages, webpages, or QR codes
- Use hardware wallets or vetted signing workflows for high-value transactions
- monitor official vendor advisories and enable automatic updates or crash reporting where available
- Report crashes and suspicious URIs to wallet developers and incident response teams to help with remediation
Stakeholders should track the CVE entry and vendor advisories for confirmation of affected versions and for coordinated disclosure timelines.
How the Exploit Works: Dissecting the BIP72 URI Attack Vector
Attackers exploit the BIP72 URI by embedding a remote payment request reference (the r parameter) inside a bitcoin: link or QR code,prompting wallets to fetch a payment request from an attacker-controlled URL. Once the wallet retrieves that request, the attacker can present altered output scripts, substitute addresses, change amounts, or force redirects - all under the guise of a legitimate payment flow. The exploit is most effective against clients that auto-fetch remote requests, fail to validate TLS certificates or payment request signatures, or do not surface the full output details to the user before finalizing the transaction; in such cases the visual amount or label can be trusted while the destination outputs have already been tampered with.
Practical indicators and mitigations are straightforward:
- Indicators: unexpected network fetches when opening a URI, mismatched payee names or addresses between the displayed invoice and the on-chain outputs, and requests served over plain HTTP or with invalid certificates.
- Mitigations: disable automatic remote payment fetching, verify on-chain destination addresses before confirming payment, prefer URIs that include explicit addresses (or type them manually), and insist on TLS and valid payment-request signatures where supported.

Scope and Impact: Affected Wallets, Users and Real‑World Risks
The incident touches a broad cross-section of the Bitcoin ecosystem, from individual holders to institutional custodians. Affected systems include both hot and cold storage solutions, with impacts varying by architecture and custody model. Key categories at risk include:
- Hardware wallets – compromised firmware or supply‑chain tampering that can expose private keys.
- Software (desktop & mobile) wallets – vulnerable to malware, malicious updates, or permission abuse.
- Custodial services and exchanges – centralized points where user balances and access credentials can be targeted.
- Multisig and smart‑contract wallets – complex failure modes when one or more signers or contracts are compromised.
- Cold‑storage and paper wallets – physical loss, damage, or inadequate backup procedures creating irrecoverable losses.
For users, the real‑world risks range from immediate theft of funds to long‑term loss of access and transaction disputes; these outcomes can cascade into reputational harm and financial contagion for connected platforms. journalistic analysis shows that practical mitigations include rigorous backup of seed material, use of reputable hardware vendors, timely firmware and software updates, and robust operational practices – such as multi‑factor authentication and multisig arrangements – to reduce single points of failure. Stakeholders should also prepare for non‑technical risks like regulatory enforcement or account inactivity policies by maintaining clear custodial agreements and recovery procedures,and remain vigilant against phishing and social‑engineering campaigns that exploit human weaknesses rather than technical flaws.
Mitigation and Response: Patches, Workarounds and Recommended Safeguards
Act quickly to lock down affected accounts and remove easy attack vectors. Follow account recovery procedures exactly as provided by the service: go to the password assistance page, enter your account email, complete the visual verification, and choose a recovery method to regain control.As a rule,change compromised passwords immediately,avoid reusing previous passwords (many providers block reuse),and enable multi‑factor authentication wherever available to add a second layer of defense. Basic steps to perform now include:
- Reset passwords through the provider’s official password assistance flow.
- Confirm recovery options (backup email, phone number, authenticator apps).
- Revoke suspicious sessions and app access from your account security settings.
On devices, prioritize containment and hygiene: use built‑in remote‑locate and wipe features if a phone or tablet is lost or suspected compromised, and review installed applications for unauthorized entries. For Android users,leverage Find My Device and,where available,locate a paired Wear OS watch to help find or secure a device; if recovery isn’t possible,use remote erase to protect data. Maintain a routine of installing OS and app updates to apply security patches, and periodically audit the list of previously downloaded apps to remove anything unfamiliar. Recommended actions include:
- Locate or erase devices remotely using platform tools (e.g., Android device management features).
- Install updates and security patches for the operating system and apps without delay.
- Audit installed apps and permissions, removing or disabling any unrecognized software.
As the security community digests the implications of CVE-2024-52918 – a crash triggered by specially crafted BIP72 URIs – the immediate takeaway is clear: treat payment-request links with caution and prioritize patching. This vulnerability targets a commonly used Bitcoin URI mechanism and can destabilize affected wallet software; while a crash may seem low risk compared with remote code execution, it can still be abused for denial-of-service, transaction manipulation or to create confusing and unsafe user experiences.
Practical next steps for readers and organizations:
– Check your wallet vendor’s advisories and apply any available patches or updates immediately.- Avoid clicking or importing unfamiliar BIP72/payment-request links; verify payment destinations out of band when possible.
– Harden endpoints that handle external URIs (disable automatic handling where feasible) and enable automatic updates for critical wallet software.- Audit logs and user reports for unexplained crashes or suspicious payment requests; treat those as potential indicators of exploitation.
– Back up wallet data and keys securely before applying changes, and consider using hardware wallets or other hardened signing solutions for high-value holdings.
For authoritative, up-to-date information, consult the CVE entry and vendor security notices rather than social posts or unverified write-ups. Security teams should monitor the NVD/Mitre listings, vendor advisories, and established crypto-security mailing lists for patches and mitigation guidance. We’ll continue to follow developments and report confirmed technical details and vendor responses as they emerge – subscribe to alerts from your wallet provider and respected security outlets to stay informed.
