mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new challenge, and the server would accept the replayed Stripe PaymentIntent as a new successful payment without actually charging the customer again. This allowed an attacker to pay once and consume unlimited resources by replaying the credential. This issue has been patched in version 0.4.11.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8mhj-rffc-rcvw mppx has Stripe charge credential replay via missing idempotency check
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 31 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new challenge, and the server would accept the replayed Stripe PaymentIntent as a new successful payment without actually charging the customer again. This allowed an attacker to pay once and consume unlimited resources by replaying the credential. This issue has been patched in version 0.4.11.
Title mppx has Stripe charge credential replay via missing idempotency check
Weaknesses CWE-697
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T14:10:10.463Z

Reserved: 2026-03-26T15:57:52.324Z

Link: CVE-2026-34210

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-31T15:16:18.207

Modified: 2026-03-31T15:16:18.207

Link: CVE-2026-34210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses