Description
mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. This issue has been patched in version 0.4.11.
Published: 2026-03-31
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Channel Closure
Action: Immediate Patch
AI Analysis

Impact

A flaw in mppx’s session close handler accepts a close voucher whose amount equals the settled on‑chain amount. The code uses a less‑than comparison instead of a less‑than‑or‑equal comparison, which causes the voucher to be treated as valid and the channel to close without committing any additional funds. This permits an attacker to close or grief a channel at no cost, potentially causing financial loss to a counterparty and disrupting normal payment operations.

Affected Systems

The wevm:mppx package, an interface for the machine payments protocol, is affected. All releases prior to version 0.4.11 contain the vulnerability and require an update to v0.4.11 or later.

Risk and Exploitability

The CVSS score of 7.5 highlights a high‑severity flaw, whereas the EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not yet listed in the CISA KEV catalog, suggesting no widespread exploitation has been documented. Attackers must be able to submit a close voucher to the protocol, implying a remote or network‑based vector. Given the high impact and moderate severity, rapid remediation is recommended.

Generated by OpenCVE AI on April 3, 2026 at 18:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the wevm:mppx package to version 0.4.11 or later
  • Verify that the application is using the corrected close voucher logic
  • Monitor system logs for unexpected channel closure events
  • Check the project's GitHub repository for additional advisories or updates

Generated by OpenCVE AI on April 3, 2026 at 18:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mv9j-8jvg-j8mr mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality
History

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wevm:mppx:*:*:*:*:*:node.js:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Wevm
Wevm mppx
Vendors & Products Wevm
Wevm mppx

Tue, 31 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. This issue has been patched in version 0.4.11.
Title mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality
Weaknesses CWE-294
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T15:13:32.047Z

Reserved: 2026-03-26T15:57:52.324Z

Link: CVE-2026-34209

cve-icon Vulnrichment

Updated: 2026-04-02T15:13:26.917Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T15:16:18.030

Modified: 2026-04-03T15:59:37.143

Link: CVE-2026-34209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:43Z

Weaknesses