CVE-2026-34210
Published: 31 March 2026
Summary
CVE-2026-34210 is a high-severity Incorrect Comparison (CWE-697) vulnerability in Wevm Mppx. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring identification, testing, and installation of the patch in mppx version 0.4.11 that checks Stripe's Idempotent-Replayed header to prevent replay attacks.
Protects against replay attacks by requiring mechanisms to ensure the authenticity of payment sessions or transactions, preventing acceptance of replayed Stripe PaymentIntents as new payments.
Requires validation of information inputs from Stripe API responses, including checking the Idempotent-Replayed header to reject replayed PaymentIntents.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows replay attacks against the Stripe payment method in a network-accessible interface, directly enabling exploitation of the public-facing application to bypass payment validation and consume resources.
NVD Description
mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against…
more
a new challenge, and the server would accept the replayed Stripe PaymentIntent as a new successful payment without actually charging the customer again. This allowed an attacker to pay once and consume unlimited resources by replaying the credential. This issue has been patched in version 0.4.11.
Deeper analysisAI
CVE-2026-34210 is a vulnerability in mppx, a TypeScript interface for the machine payments protocol, affecting versions prior to 0.4.11. The stripe/charge payment method fails to check Stripe's Idempotent-Replayed response header when creating PaymentIntents, enabling replay attacks. This flaw, classified under CWE-697 with a CVSS score of 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), allows attackers to reuse valid credentials without proper validation.
An attacker with low privileges, such as a legitimate user who has successfully made one payment, can exploit this by replaying a valid credential containing the same spt token against a new challenge. The server accepts the replayed Stripe PaymentIntent as a new successful payment without charging the customer again, enabling the attacker to pay once and consume unlimited resources through repeated replays.
The issue has been patched in mppx version 0.4.11. Mitigation details are available in the GitHub security advisory at https://github.com/wevm/mppx/security/advisories/GHSA-8mhj-rffc-rcvw, the release notes at https://github.com/wevm/mppx/releases/tag/mppx@0.4.11, and the fixing commit at https://github.com/wevm/mppx/commit/b2b1a0b60506fc71aa80b8a025084949dca1a994. Security practitioners should upgrade to version 0.4.11 or later to address this vulnerability.
Details
- CWE(s)