mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new challenge, and the server would accept the replayed Stripe PaymentIntent as a new successful payment without actually charging the customer again. This allowed an attacker to pay once and consume unlimited resources by replaying the credential. This issue has been patched in version 0.4.11.
References
| Link | Resource |
|---|---|
| https://github.com/wevm/mppx/commit/b2b1a0b60506fc71aa80b8a025084949dca1a994 | Patch |
| https://github.com/wevm/mppx/releases/tag/mppx@0.4.11 | Release Notes |
| https://github.com/wevm/mppx/security/advisories/GHSA-8mhj-rffc-rcvw | Patch Vendor Advisory |
Configurations
History
03 Apr 2026, 16:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wevm
Wevm mppx |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| References | () https://github.com/wevm/mppx/commit/b2b1a0b60506fc71aa80b8a025084949dca1a994 - Patch | |
| References | () https://github.com/wevm/mppx/releases/tag/mppx@0.4.11 - Release Notes | |
| References | () https://github.com/wevm/mppx/security/advisories/GHSA-8mhj-rffc-rcvw - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:wevm:mppx:*:*:*:*:*:node.js:*:* |
31 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 15:16
Updated : 2026-04-03 16:17
NVD link : CVE-2026-34210
Mitre link : CVE-2026-34210
CVE.ORG link : CVE-2026-34210
JSON object : View
Products Affected
wevm
- mppx
CWE
CWE-697
Incorrect Comparison
