Multiple vulnerabilities have been discovered in the `mppx` nodejs package, potentially allowing for payment bypass and credential replay attacks. These vulnerabilities could allow attackers to consume resources without payment or manipulate payment processes. Patches are available in versions 0.4.11 and 0.4.8 to address these issues.
One vulnerability has a CVSS score of 9.5, indicating critical severity and high exploitability.
What is Mppx?
CVE-2026-34210: Mppx Stripe Charge Credential Replay
No CVSS score provided.
EPSS score of 0.04 suggests low exploitability.
The `stripe/charge` payment method in `mppx` lacked a check for Stripe's `Idempotent-Replayed` response header. An attacker could replay a valid credential, using the same `spt` token, against a new challenge, leading the server to accept the replayed Stripe PaymentIntent as a new successful payment without additional charges.
How to fix CVE-2026-34210 in Mppx
Patch immediately- 1.Update the `mppx` package to version 0.4.11 or later.
npm update mppxVerify with:
npm list mppxWorkaround: There are no workarounds available for this vulnerability.
NextGuard automatically flags CVE-2026-34210 if Mppx appears in any of your monitored projects — no manual lookup required.
GHSA-8x4m-qw58-3pcx: Mppx Multiple Payment Bypass and Griefing Vulnerabilities
Critical severity, high exploitability.
No EPSS score provided.
Multiple vulnerabilities were discovered in `tempo/charge` and `tempo/session` within `mppx`, allowing attackers to bypass payments and grief channels. These include replaying transaction hashes, performing free requests, manipulating fee payers, and bypassing voucher signature verification.
How to fix GHSA-8x4m-qw58-3pcx in Mppx
Patch immediately- 1.Update the `mppx` package to version 0.4.8 or later.
npm update mppxVerify with:
npm list mppxWorkaround: There are no workarounds available for these vulnerabilities.
NextGuard automatically flags GHSA-8x4m-qw58-3pcx if Mppx appears in any of your monitored projects — no manual lookup required.
Stay ahead of nodejs vulnerabilities
Proactively detect and remediate vulnerabilities in your nodejs projects. monitor your nodejs dependencies with NextGuard.
Compare PlansFrequently asked questions
Critical vulnerabilities in `mppx` require immediate patching to prevent payment bypass and credential replay attacks. Ensure you update to versions 0.4.11 and 0.4.8 to mitigate these risks. see all nodejs vulnerabilities.
Related topics