CVE-2026-34209 PUBLISHED

mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality

Assigner: GitHub_M
Reserved: 26.03.2026 Published: 31.03.2026 Updated: 31.03.2026

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. This issue has been patched in version 0.4.11.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS Score: 7.5

Product Status

Vendor wevm
Product mppx
Versions
  • Version < 0.4.11 is affected

References

Problem Types

  • CWE-294: Authentication Bypass by Capture-replay CWE