-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lnbits | pip | < 0.12.6 | 0.12.6 |
The vulnerability stems from three key elements in eclair.py's payment handling: 1) The use of blocking requests with a 30s timeout (line 138), 2) Immediate error assumption via raise_for_status() (line 141), and 3) Payment failure determination based solely on initial response status (lines 144, 146). Together these create an improper exceptional condition check (CWE-754) by not verifying actual payment state after timeout. The function's error handling flow makes it vulnerable to the described race condition attack.
Ongoing coverage of React2Shell