| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v7xq-3wx6-fqc2 | In monetr, unauthenticated Stripe webhook reads attacker-sized request bodies before signature validation |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:monetr:monetr:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monetr
Monetr monetr |
|
| Vendors & Products |
Monetr
Monetr monetr |
Mon, 20 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | monetr is a budgeting application for recurring expenses. In versions 1.12.3 and below, the public Stripe webhook endpoint buffers the entire request body into memory before validating the Stripe signature. A remote unauthenticated attacker can send oversized POST payloads to cause uncontrolled memory growth, leading to denial of service. The issue affects deployments with Stripe webhooks enabled and is mitigated if an upstream proxy enforces a request body size limit. This issue has been fixed in version 1.12.4. | |
| Title | monetr: Unauthenticated Stripe webhook reads attacker-sized request bodies before signature validation | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T13:36:05.862Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40481
Updated: 2026-04-20T13:32:35.321Z
Status : Analyzed
Published: 2026-04-17T23:16:12.457
Modified: 2026-04-24T16:57:39.337
Link: CVE-2026-40481
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:59:25Z
Github GHSA