CVE-2026-34210: CWE-697: Incorrect Comparison in wevm mppx
CVE-2026-34210 is a medium severity vulnerability in the mppx TypeScript interface for machine payments protocol, specifically affecting versions prior to 0. 4. 11. The flaw involves an incorrect comparison in the stripe/charge payment method, where the system fails to verify Stripe's Idempotent-Replayed response header when creating PaymentIntents. This allows an attacker to replay a valid payment credential containing the same spt token against a new challenge, causing the server to accept the replayed PaymentIntent as a new successful payment without charging the customer again. Consequently, attackers can pay once but consume unlimited resources by replaying the credential multiple times. The issue has been fixed in version 0. 4. 11. Exploitation requires low privileges and partial authentication but no user interaction.
AI Analysis
Technical Summary
CVE-2026-34210 is a vulnerability classified under CWE-697 (Incorrect Comparison) affecting the mppx TypeScript interface, a component used for machine payments protocol implementations. The vulnerability exists in versions prior to 0.4.11, specifically in the stripe/charge payment method. The root cause is the failure to properly check Stripe's Idempotent-Replayed response header when creating PaymentIntents. Stripe uses this header to indicate that a payment request is a replay of a previously processed request, which should not result in a new charge. Due to the incorrect comparison logic, the system accepts replayed PaymentIntents as new successful payments without charging the customer again. Attackers can exploit this by capturing a valid payment credential containing the spt token and replaying it against new payment challenges, effectively allowing them to consume unlimited resources or services while only paying once. The vulnerability requires the attacker to have some level of authentication (partial privileges) but does not require user interaction, and the attack can be performed remotely over the network. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, reflecting the moderate impact on integrity and availability but no impact on confidentiality. The issue was patched in mppx version 0.4.11, which correctly validates the Idempotent-Replayed header to prevent replay attacks. No known exploits have been reported in the wild to date.
Potential Impact
The primary impact of this vulnerability is financial and resource abuse. Organizations using vulnerable versions of mppx with Stripe payment integration may face fraudulent transactions where attackers replay valid payment credentials to consume services or resources without additional charges. This can lead to significant financial losses, depletion of service quotas, and potential denial of service due to resource exhaustion. The integrity of payment processing is compromised, undermining trust in the payment system. Since the vulnerability allows bypassing payment charges, it can also facilitate fraud and abuse in subscription services, pay-per-use platforms, or any system relying on mppx for payment validation. While confidentiality is not directly affected, the availability and integrity of payment services are at risk. The ease of exploitation combined with the ability to perform attacks remotely increases the threat level for organizations worldwide that rely on this payment interface.
Mitigation Recommendations
Organizations should immediately upgrade mppx to version 0.4.11 or later to ensure the patch addressing this vulnerability is applied. Additionally, implement strict validation of Stripe's Idempotent-Replayed response headers in payment workflows to detect and reject replayed payment intents. Employ monitoring and alerting for unusual payment patterns indicative of replay attacks, such as multiple identical PaymentIntents from the same token. Integrate rate limiting and anomaly detection on payment endpoints to reduce the risk of automated replay attempts. Conduct thorough code reviews and testing of payment processing logic to ensure all idempotency and replay protections are correctly enforced. Consider additional multi-factor authentication or challenge-response mechanisms for high-value transactions to increase attack complexity. Finally, maintain up-to-date dependency management and vulnerability scanning to quickly identify and remediate similar issues in third-party components.
Affected Countries
United States, United Kingdom, Canada, Germany, France, Australia, Japan, South Korea, Netherlands, Sweden
CVE-2026-34210: CWE-697: Incorrect Comparison in wevm mppx
Description
CVE-2026-34210 is a medium severity vulnerability in the mppx TypeScript interface for machine payments protocol, specifically affecting versions prior to 0. 4. 11. The flaw involves an incorrect comparison in the stripe/charge payment method, where the system fails to verify Stripe's Idempotent-Replayed response header when creating PaymentIntents. This allows an attacker to replay a valid payment credential containing the same spt token against a new challenge, causing the server to accept the replayed PaymentIntent as a new successful payment without charging the customer again. Consequently, attackers can pay once but consume unlimited resources by replaying the credential multiple times. The issue has been fixed in version 0. 4. 11. Exploitation requires low privileges and partial authentication but no user interaction.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34210 is a vulnerability classified under CWE-697 (Incorrect Comparison) affecting the mppx TypeScript interface, a component used for machine payments protocol implementations. The vulnerability exists in versions prior to 0.4.11, specifically in the stripe/charge payment method. The root cause is the failure to properly check Stripe's Idempotent-Replayed response header when creating PaymentIntents. Stripe uses this header to indicate that a payment request is a replay of a previously processed request, which should not result in a new charge. Due to the incorrect comparison logic, the system accepts replayed PaymentIntents as new successful payments without charging the customer again. Attackers can exploit this by capturing a valid payment credential containing the spt token and replaying it against new payment challenges, effectively allowing them to consume unlimited resources or services while only paying once. The vulnerability requires the attacker to have some level of authentication (partial privileges) but does not require user interaction, and the attack can be performed remotely over the network. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, reflecting the moderate impact on integrity and availability but no impact on confidentiality. The issue was patched in mppx version 0.4.11, which correctly validates the Idempotent-Replayed header to prevent replay attacks. No known exploits have been reported in the wild to date.
Potential Impact
The primary impact of this vulnerability is financial and resource abuse. Organizations using vulnerable versions of mppx with Stripe payment integration may face fraudulent transactions where attackers replay valid payment credentials to consume services or resources without additional charges. This can lead to significant financial losses, depletion of service quotas, and potential denial of service due to resource exhaustion. The integrity of payment processing is compromised, undermining trust in the payment system. Since the vulnerability allows bypassing payment charges, it can also facilitate fraud and abuse in subscription services, pay-per-use platforms, or any system relying on mppx for payment validation. While confidentiality is not directly affected, the availability and integrity of payment services are at risk. The ease of exploitation combined with the ability to perform attacks remotely increases the threat level for organizations worldwide that rely on this payment interface.
Mitigation Recommendations
Organizations should immediately upgrade mppx to version 0.4.11 or later to ensure the patch addressing this vulnerability is applied. Additionally, implement strict validation of Stripe's Idempotent-Replayed response headers in payment workflows to detect and reject replayed payment intents. Employ monitoring and alerting for unusual payment patterns indicative of replay attacks, such as multiple identical PaymentIntents from the same token. Integrate rate limiting and anomaly detection on payment endpoints to reduce the risk of automated replay attempts. Conduct thorough code reviews and testing of payment processing logic to ensure all idempotency and replay protections are correctly enforced. Consider additional multi-factor authentication or challenge-response mechanisms for high-value transactions to increase attack complexity. Finally, maintain up-to-date dependency management and vulnerability scanning to quickly identify and remediate similar issues in third-party components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-26T15:57:52.324Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69cbd8dce6bfc5ba1d1c31a2
Added to database: 3/31/2026, 2:23:24 PM
Last enriched: 3/31/2026, 2:41:11 PM
Last updated: 3/31/2026, 3:52:00 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.