Multiple vulnerabilities were discovered which allowed for undesirable behaviors, including:
- Performing free tempo/charge requests
- Replaying existing tempo/charge requests
- Performing free tempo/session requests
- Piggybacking off existing tempo/session channels
- Griefing existing tempo/session channels
- Manipulate the fee payer of a tempo/charge or tempo/session handler into paying for requests
- Replaying existing stripe/charge requests
The issues are patched in 0.8.0
There are no workarounds available for these vulnerabilities
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-29T15:20:45Z",
"severity": "CRITICAL",
"nvd_published_at": null,
"cwe_ids": [
"CWE-288",
"CWE-294",
"CWE-345"
]
}