Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34210: CWE-697: Incorrect Comparison in wevm mppx

0
Medium
VulnerabilityCVE-2026-34210cvecve-2026-34210cwe-697
Published: Tue Mar 31 2026 (03/31/2026, 14:10:10 UTC)
Source: CVE Database V5
Vendor/Project: wevm
Product: mppx

Description

CVE-2026-34210 is a medium severity vulnerability in the mppx TypeScript interface for machine payments protocol, specifically affecting versions prior to 0. 4. 11. The flaw involves an incorrect comparison in the stripe/charge payment method, where the system fails to verify Stripe's Idempotent-Replayed response header when creating PaymentIntents. This allows an attacker to replay a valid payment credential containing the same spt token against a new challenge, causing the server to accept the replayed PaymentIntent as a new successful payment without charging the customer again. Consequently, attackers can pay once but consume unlimited resources by replaying the credential multiple times. The issue has been fixed in version 0. 4. 11. Exploitation requires low privileges and partial authentication but no user interaction.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 14:41:11 UTC

Technical Analysis

CVE-2026-34210 is a vulnerability classified under CWE-697 (Incorrect Comparison) affecting the mppx TypeScript interface, a component used for machine payments protocol implementations. The vulnerability exists in versions prior to 0.4.11, specifically in the stripe/charge payment method. The root cause is the failure to properly check Stripe's Idempotent-Replayed response header when creating PaymentIntents. Stripe uses this header to indicate that a payment request is a replay of a previously processed request, which should not result in a new charge. Due to the incorrect comparison logic, the system accepts replayed PaymentIntents as new successful payments without charging the customer again. Attackers can exploit this by capturing a valid payment credential containing the spt token and replaying it against new payment challenges, effectively allowing them to consume unlimited resources or services while only paying once. The vulnerability requires the attacker to have some level of authentication (partial privileges) but does not require user interaction, and the attack can be performed remotely over the network. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, reflecting the moderate impact on integrity and availability but no impact on confidentiality. The issue was patched in mppx version 0.4.11, which correctly validates the Idempotent-Replayed header to prevent replay attacks. No known exploits have been reported in the wild to date.

Potential Impact

The primary impact of this vulnerability is financial and resource abuse. Organizations using vulnerable versions of mppx with Stripe payment integration may face fraudulent transactions where attackers replay valid payment credentials to consume services or resources without additional charges. This can lead to significant financial losses, depletion of service quotas, and potential denial of service due to resource exhaustion. The integrity of payment processing is compromised, undermining trust in the payment system. Since the vulnerability allows bypassing payment charges, it can also facilitate fraud and abuse in subscription services, pay-per-use platforms, or any system relying on mppx for payment validation. While confidentiality is not directly affected, the availability and integrity of payment services are at risk. The ease of exploitation combined with the ability to perform attacks remotely increases the threat level for organizations worldwide that rely on this payment interface.

Mitigation Recommendations

Organizations should immediately upgrade mppx to version 0.4.11 or later to ensure the patch addressing this vulnerability is applied. Additionally, implement strict validation of Stripe's Idempotent-Replayed response headers in payment workflows to detect and reject replayed payment intents. Employ monitoring and alerting for unusual payment patterns indicative of replay attacks, such as multiple identical PaymentIntents from the same token. Integrate rate limiting and anomaly detection on payment endpoints to reduce the risk of automated replay attempts. Conduct thorough code reviews and testing of payment processing logic to ensure all idempotency and replay protections are correctly enforced. Consider additional multi-factor authentication or challenge-response mechanisms for high-value transactions to increase attack complexity. Finally, maintain up-to-date dependency management and vulnerability scanning to quickly identify and remediate similar issues in third-party components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T15:57:52.324Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cbd8dce6bfc5ba1d1c31a2

Added to database: 3/31/2026, 2:23:24 PM

Last enriched: 3/31/2026, 2:41:11 PM

Last updated: 3/31/2026, 3:52:00 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses