monetr is a budgeting application for recurring expenses. In versions 1.12.3 and below, the public Stripe webhook endpoint buffers the entire request body into memory before validating the Stripe signature. A remote unauthenticated attacker can send oversized POST payloads to cause uncontrolled memory growth, leading to denial of service. The issue affects deployments with Stripe webhooks enabled and is mitigated if an upstream proxy enforces a request body size limit. This issue has been fixed in version 1.12.4.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Apr 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | monetr is a budgeting application for recurring expenses. In versions 1.12.3 and below, the public Stripe webhook endpoint buffers the entire request body into memory before validating the Stripe signature. A remote unauthenticated attacker can send oversized POST payloads to cause uncontrolled memory growth, leading to denial of service. The issue affects deployments with Stripe webhooks enabled and is mitigated if an upstream proxy enforces a request body size limit. This issue has been fixed in version 1.12.4. | |
| Title | monetr: Unauthenticated Stripe webhook reads attacker-sized request bodies before signature validation | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-17T22:54:57.545Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40481
No data.
Status : Received
Published: 2026-04-17T23:16:12.457
Modified: 2026-04-17T23:16:12.457
Link: CVE-2026-40481
No data.
OpenCVE Enrichment
No data.