GHSA-mv9j-8jvg-j8mr

Suggest an improvement
Source
https://github.com/advisories/GHSA-mv9j-8jvg-j8mr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mv9j-8jvg-j8mr/GHSA-mv9j-8jvg-j8mr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mv9j-8jvg-j8mr
Aliases
  • CVE-2026-34209
Published
2026-03-29T15:10:03Z
Modified
2026-03-31T19:05:19.688464Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality
Details

Impact

The tempo/session cooperative close handler validated the close voucher amount using < instead of <= against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free.

Patches

Fixed in 0.4.11.

Workarounds

There are no workarounds available for this vulnerability.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-294"
    ],
    "nvd_published_at": "2026-03-31T15:16:18Z",
    "github_reviewed_at": "2026-03-29T15:10:03Z",
    "severity": "HIGH"
}
References

Affected packages

npm / mppx

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.11

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mv9j-8jvg-j8mr/GHSA-mv9j-8jvg-j8mr.json"