Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. mppx
  4. ›
  5. GHSA-8x4m-qw58-3pcx

GHSA-8x4m-qw58-3pcx: mppx has multiple payment bypass and griefing vulnerabilities

March 29, 2026

Multiple vulnerabilities were discovered in tempo/charge and tempo/session which allowed for undesirable behaviors, including:

  • Replaying tempo/charge transaction hashes across push/pull modes, across charge/session endpoints, and via concurrent requests
  • Performing free tempo/charge requests due to missing transfer log verification in pull-mode
  • Replaying tempo/charge credentials across routes via cross-route scope confusion (memo/splits not included in scope binding)
  • Manipulating the fee payer of a tempo/charge handler into paying for requests (missing sender signature before co-signing)
  • Bypassing tempo/session voucher signature verification
  • Piggybacking off existing tempo/session channels via settle voucher reuse and weak channel ID binding
  • Performing free tempo/session requests by exploiting channel reopen without on-chain settled state
  • Accepting deductions on finalized tempo/session channels
  • Bypassing payment on free routes via method-mismatch fallback
  • Griefing tempo/session channels via force-close detection bypass (closeRequestedAt not persisted)

References

  • github.com/advisories/GHSA-8x4m-qw58-3pcx
  • github.com/wevm/mppx
  • github.com/wevm/mppx/security/advisories/GHSA-8x4m-qw58-3pcx

Code Behaviors & Features

Detect and mitigate GHSA-8x4m-qw58-3pcx with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.4.8

Fixed versions

  • 0.4.8

Solution

Upgrade to version 0.4.8 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-288: Authentication Bypass Using an Alternate Path or Channel
  • CWE-294: Authentication Bypass by Capture-replay
  • CWE-345: Insufficient Verification of Data Authenticity

Source file

npm/mppx/GHSA-8x4m-qw58-3pcx.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:22 +0000.