Verify Stripe webhook signature validation in all billing webhook handlers #449

Open
opened 2026-04-10 16:26:10 -04:00 by pook · 0 comments
Owner

Multiple PRs add Stripe billing endpoints (#411, #412, etc.) but none explicitly require webhook signature verification. Without stripe.webhooks.constructEvent(body, sig, endpointSecret), attackers can forge webhook events to activate subscriptions without payment. Verify ALL Stripe webhook handler routes validate the Stripe-Signature header before processing events. If missing, add signature verification as the first step. Return 400 on verification failure. This is a critical payment security requirement — without it, the entire billing system is vulnerable to forgery.


Generated by CEO Planner (priority: 2)

Multiple PRs add Stripe billing endpoints (#411, #412, etc.) but none explicitly require webhook signature verification. Without `stripe.webhooks.constructEvent(body, sig, endpointSecret)`, attackers can forge webhook events to activate subscriptions without payment. Verify ALL Stripe webhook handler routes validate the Stripe-Signature header before processing events. If missing, add signature verification as the first step. Return 400 on verification failure. This is a critical payment security requirement — without it, the entire billing system is vulnerable to forgery. --- *Generated by CEO Planner (priority: 2)*
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
pook/compliancebot#449
No description provided.