Critical Vulnerability Report: SEPA Direct Debit Payment System Validation Issue on Stripe Payment Gateway
Description
A significant vulnerability has been identified in Stripe's SEPA Direct Debit payment system implementation, affecting multiple client companies including nele.ai. This vulnerability allows for premium subscription activation without proper IBAN validation, potentially violating EU financial regulations around payment verification and posing risks of unauthorized IBAN usage.
CVSS Score: 8.8 (High)
Steps to Reproduce:
Technical Details
The current implementation allows:
Impact
Regulatory Implications
The EU's new Instant Payments Regulation mandates:
Business Impact
Scope of the Issue
This vulnerability is present in most Stripe-based payment services that offer SEPA Direct Debit as a payment method. nele.ai is just one example of affected companies. The issue could lead to substantial financial losses across Stripe's client base.
Industry Comparison
Companies like hide.me and squarespace.com, which use their own payment gateways, have successfully implemented proper IBAN validation, demonstrating that this issue can be effectively addressed.
Recommended Fixes
- Account holder name validation
- Integration with verification services
- Real-time IBAN validation before subscription activation
- Verify payment before service provisioning
- Implement proper transaction monitoring
Additional Information
I have attached the following to this report:
Please note that I have also reported this vulnerability to nele.ai (support@nele.ai) to ensure all relevant parties are informed.
Disclosure Timeline
Conclusion
This widespread vulnerability in Stripe's SEPA Direct Debit implementation potentially exposes both regulatory compliance risks and significant revenue leakage through failed SEPA mandates for Stripe and its client companies. Swift implementation of proper verification measures across Stripe's platform would help mitigate these risks and bring Stripe's services in line with industry best practices.