


Perceptive Security
SOC/SIEM Consultancy

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher a…
Published:
30 March 2026 at 22:00:00
Alert date:
31 March 2026 at 17:08:47
Source:
nvd.nist.gov
Supply Chain & Dependencies, Web Technologies
A vulnerability in mppx, a TypeScript interface for machine payments protocol, allows attackers to bypass validation in the tempo/session cooperative close handler. The flaw uses incorrect comparison operator ('<' instead of '<=') when validating close voucher amounts against on-chain settled amounts. An attacker can submit a close voucher exactly equal to the settled amount, which gets accepted without committing new funds, effectively allowing free channel closure or griefing attacks. The vulnerability affects versions prior to 0.4.11 and has been patched in version 0.4.11.
Technical details
Mitigation steps:
Affected products:
mppx
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34209
https://github.com/wevm/mppx/commit/94088246ee18f21b5d6be40d9e7a464f5a280bfb
https://github.com/wevm/mppx/releases/tag/mppx@0.4.11
https://github.com/wevm/mppx/security/advisories/GHSA-mv9j-8jvg-j8mr
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
