Description
mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. This issue has been patched in version 0.4.11.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mv9j-8jvg-j8mr | mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality |
References
History
Tue, 31 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. This issue has been patched in version 0.4.11. | |
| Title | mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality | |
| Weaknesses | CWE-294 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T14:10:46.416Z
Reserved: 2026-03-26T15:57:52.324Z
Link: CVE-2026-34209
No data.
Status : Received
Published: 2026-03-31T15:16:18.030
Modified: 2026-03-31T15:16:18.030
Link: CVE-2026-34209
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA