CVE-2026-40481 PUBLISHED

monetr: Unauthenticated Stripe webhook reads attacker-sized request bodies before signature validation

Assigner: GitHub_M
Reserved: 13.04.2026 Published: 17.04.2026 Updated: 17.04.2026

monetr is a budgeting application for recurring expenses. In versions 1.12.3 and below, the public Stripe webhook endpoint buffers the entire request body into memory before validating the Stripe signature. A remote unauthenticated attacker can send oversized POST payloads to cause uncontrolled memory growth, leading to denial of service. The issue affects deployments with Stripe webhooks enabled and is mitigated if an upstream proxy enforces a request body size limit. This issue has been fixed in version 1.12.4.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor monetr
Product monetr
Versions
  • Version < 1.12.4 is affected

References

Problem Types

  • CWE-400: Uncontrolled Resource Consumption CWE