PT-2026-28608 · Npm · Mppx
Published
2026-03-29
·
Updated
2026-03-29
·
CVE-2026-34210
CVSS v4.0
6.0
Medium
| AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
Impact
The
stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new challenge, and the server would accept the replayed Stripe PaymentIntent as a new successful payment without actually charging the customer again. This allowed an attacker to pay once and consume unlimited resources by replaying the credential.Patches
Fixed in 0.4.11. The server now checks the
Idempotent-Replayed header and rejects replayed PaymentIntents.Workarounds
There are no workarounds available for this vulnerability.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Mppx