Home

Description

Allocation of Resources Without Limits or Throttling vulnerability in ninenines cowboy allows denial of service via unbounded buffer accumulation in multipart header parsing. cowboy_req:read_part/3 in src/cowboy_req.erl accumulates incoming request bytes into a Buffer binary with no upper-bound check. When cow_multipart:parse_headers/2 returns more or {more, Buffer2}, the function reads up to Length bytes (default 64 KB) from the request body and recurses with the enlarged buffer. There is no equivalent of the byte_size(Acc) > Length guard present in the sibling function read_part_body/4. An unauthenticated attacker can send a multipart/form-data request whose body never yields a complete header section — for example, a body that never contains the advertised boundary delimiter, or one whose header lines never contain \r\n\r\n — and force the server process to accumulate memory linearly with the bytes the protocol layer is willing to deliver. A handful of concurrent such uploads is sufficient to exhaust BEAM memory. This issue affects cowboy from 2.0.0 before 2.15.0.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-13 | Updated 2026-05-14 | Assigner EEF




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-770 Allocation of Resources Without Limits or Throttling

Product status

Default status
unaffected

2.0.0 (semver) before 2.15.0
affected

Default status
unaffected

917cf99e10c41676183d501b86af6e47c95afb89 (git) before 5c6a2061b41bb5771c4659fac7d5a822dca5bafb
affected

Credits

Peter Ullrich finder

Loïc Hoguin remediation developer

References

cna.erlef.org/cves/CVE-2026-8466.html related third-party-advisory

osv.dev/vulnerability/EEF-CVE-2026-8466 related

github.com/...ommit/5c6a2061b41bb5771c4659fac7d5a822dca5bafb patch

cve.org (CVE-2026-8466)

nvd.nist.gov (CVE-2026-8466)

Download JSON