Home

Description

Allocation of Resources Without Limits or Throttling vulnerability in phoenixframework phoenix allows a denial of service via the long-poll transport's NDJSON body handling. In 'Elixir.Phoenix.Transports.LongPoll':publish/4, when a POST request is received with Content-Type: application/x-ndjson, the request body is split on newline characters using String.split/2 with no limit on the number of resulting segments. An attacker can send a body consisting entirely of newline bytes, causing a 1:1 amplification into a list of empty binaries — a 1 MB body produces approximately one million list elements, an 8 MB body approximately 8.4 million. Each element is then walked by Enum.map, materializing another list of the same size. This exhausts BEAM memory and schedulers, crashing the node and terminating all active sessions. A session token required to reach the vulnerable endpoint is freely obtainable by any client via an unauthenticated GET request to the same URL with a matching Origin header, making this attack effectively unauthenticated. This issue affects phoenix: from 1.7.0 before 1.7.22 and 1.8.6.

PUBLISHED Reserved 2026-03-13 | Published 2026-05-05 | Updated 2026-05-07 | Assigner EEF




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-770 Allocation of Resources Without Limits or Throttling

Product status

Default status
unaffected

1.7.0 (semver) before 1.7.22
affected

1.8.0 (semver) before 1.8.6
affected

Default status
unaffected

2674c6ea30634667f9b09966b90269393b445953 (git) before *
affected

Credits

Peter Ullrich finder

References

github.com/...hoenix/security/advisories/GHSA-628h-q48j-jr6q vendor-advisory related

cna.erlef.org/cves/CVE-2026-32689.html related

osv.dev/vulnerability/EEF-CVE-2026-32689 related

github.com/...ommit/1a67c61ff9ce0a7711662ac7354861917a7c80f7 patch

github.com/...ommit/912ea181fd247c21dbcc49fb97d0053b947d81bf patch

cve.org (CVE-2026-32689)

nvd.nist.gov (CVE-2026-32689)

Download JSON