Home

Description

Code Injection vulnerability in phenixdigital phoenix_storybook allows unauthenticated remote code execution via unsanitized attribute value interpolation in HEEx template generation. The psb-assign WebSocket event handler in 'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handle_event/3 accepts arbitrary attribute names and values from unauthenticated clients. These values are passed to 'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handle_set_variation_assign/3, which stores them verbatim. When rendering, 'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributes_markup/1 interpolates binary attribute values directly into a HEEx template string as name="<val>" without escaping double quotes or HEEx expression delimiters. An attacker can supply a value containing a closing quote followed by a HEEx expression block (e.g. foo" injected={EXPR} bar="), which causes EXPR to be treated as an inline Elixir expression. The resulting template is compiled via EEx.compile_string/2 and executed via Code.eval_quoted_with_env/3 with full Kernel imports and no sandbox, giving the attacker arbitrary code execution on the server. This issue affects phoenix_storybook from 0.5.0 before 1.1.0.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-20 | Updated 2026-05-20 | Assigner EEF




CRITICAL: 9.5CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

0.5.0 (semver) before 1.1.0
affected

Default status
unaffected

e35379dfe2ef1a71b141899e36f431017c55265d (git) before 56ab8464d4375fa52db806148a06cce126ad481d
affected

Credits

Nick Mykhailyshyn finder

Cenk Kücük analyst

Christian Blavier remediation developer

Jonatan Männchen coordinator

References

github.com/...rybook/security/advisories/GHSA-55hg-8qxv-qj4p vendor-advisory related

cna.erlef.org/cves/CVE-2026-8467.html related

osv.dev/vulnerability/EEF-CVE-2026-8467 related

github.com/...ommit/56ab8464d4375fa52db806148a06cce126ad481d patch

cve.org (CVE-2026-8467)

nvd.nist.gov (CVE-2026-8467)

Download JSON