Impact
A vulnerability in the public Stripe webhook endpoint of monetr buffers the entire request body into memory before validating the Stripe signature. This allows a remote unauthenticated attacker to send oversized POST payloads that trigger uncontrolled memory growth, leading to denial of service. The weakness is reflected in CWE‑400 and is limited to applications that have Stripe webhooks enabled.
Affected Systems
The issue affects monetr monetr deployments using versions 1.12.3 and earlier. Attackers can target any instance that exposes the Stripe webhook and has the bug present.
Risk and Exploitability
With a CVSS score of 8.2 the vulnerability is considered high severity. The EPSS score is currently unavailable, but the impact is significant for any exposed webhook. It is not listed in the CISA KEV catalog. Without defensive controls, the flaw can be exploited remotely by an unauthenticated user, and the denial of service can affect application availability.
OpenCVE Enrichment
Github GHSA