Executive Summary: In March 2026, a critical privacy flaw was discovered in Wasabi Wallet affecting versions up to 2.1.0, enabling transaction desynchronization attacks that leak CoinJoin selection metadata to network peers. The vulnerability, tracked as CVE-2026-4218, stems from improper handling of transaction synchronization timelines, allowing adversaries to infer user participation in CoinJoin rounds based on timing discrepancies. While no direct theft of funds occurred, the exposure of metadata undermines the wallet’s primary privacy promise—plausible deniability in coin mixing. This article analyzes the root cause, exploitation vectors, and long-term implications for privacy-focused Bitcoin wallets.
The flaw arises from a mismatch between the wallet’s internal transaction propagation schedule and the Bitcoin network’s expected behavior. Wasabi Wallet, like many CoinJoin implementations, relies on zero-knowledge proofs (ZKPs) and Chaumian CoinJoin protocols to obscure transaction links. However, due to the wallet’s aggressive fee optimization and frequent Tor circuit rotation, transaction broadcasts are often delayed or reordered relative to peers.
Under normal conditions, all participants in a CoinJoin round should broadcast their finalized transactions within a narrow time window (<10 seconds). The Wasabi Wallet’s TransactionRelayService uses a background scheduler to broadcast transactions asynchronously, especially when the wallet is under load or connected through multiple Tor circuits. This behavior creates detectable timing patterns:
Researchers at Bitcoin Privacy Labs demonstrated that by monitoring the P2P network for inv and tx messages from Wasabi nodes, an attacker can statistically link timing anomalies to known CoinJoin round IDs, reducing the anonymity set from thousands to dozens of potential users.
An adversary monitoring the Bitcoin P2P network can perform the following steps:
tx messages with high input count and equal output distribution.inv message arrival.The attack requires no active interaction with the victim and can be executed at scale using distributed monitoring nodes. In controlled tests, the classifier achieved 87% precision in identifying active Wasabi users during CoinJoin rounds, with a false positive rate of 6%.
In response to the vulnerability, the Wasabi development team released version 2.1.1 on March 12, 2026, which introduces several mitigations:
inv message bursts to prevent timing correlation.The development team acknowledged the issue in a release note, stating: “While no funds were at risk, the exposure of participation metadata contradicts our privacy-first design principles. We have implemented deterministic timing controls to restore plausible deniability.”
This vulnerability highlights a fundamental tension in privacy-preserving wallets: the need for timely transaction propagation versus the requirement for indistinguishability. Even sophisticated systems like Wasabi, which employ cryptographic privacy (ZKPs, CoinJoin), can be undermined by operational timing leaks.
Three broader lessons emerge:
Future research directions include the development of privacy-preserving time synchronization protocols and zero-knowledge proof systems that hide transaction timing. Projects like Silent Payments and Fedimint are exploring alternative architectures that decouple transaction visibility from timing observability.
The Wasabi Wallet transaction desynchronization flaw is a sobering reminder that privacy in Bitcoin is not just about cryptography—it’s about operational discipline and network awareness. While the exploit did not result in fund loss, it exposed a critical metadata channel that eroded user trust. The rapid patching response demonstrates the maturity of the open-source privacy community, but the underlying challenge remains: how to build systems that are provably private even under active