top of page
perceptive_background_267k.jpg

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher a…

Published:

30 March 2026 at 22:00:00

Alert date:

31 March 2026 at 17:08:47

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Web Technologies

A vulnerability in mppx, a TypeScript interface for machine payments protocol, allows attackers to bypass validation in the tempo/session cooperative close handler. The flaw uses incorrect comparison operator ('<' instead of '<=') when validating close voucher amounts against on-chain settled amounts. An attacker can submit a close voucher exactly equal to the settled amount, which gets accepted without committing new funds, effectively allowing free channel closure or griefing attacks. The vulnerability affects versions prior to 0.4.11 and has been patched in version 0.4.11.

Technical details

Mitigation steps:

Affected products:

mppx

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page