Home

Description

Allocation of Resources Without Limits or Throttling vulnerability in phenixdigital phoenix_storybook allows unauthenticated denial-of-service via BEAM atom table exhaustion. Multiple LiveView event handlers convert user-supplied event parameter strings to atoms using String.to_atom/1 without validation: 'Elixir.PhoenixStorybook.ExtraAssignsHelpers':handle_set_variation_assign/3 interns every key of the psb-assign params map; 'Elixir.PhoenixStorybook.ExtraAssignsHelpers':handle_toggle_variation_assign/3 interns the "attr" value from psb-toggle events; 'Elixir.PhoenixStorybook.ExtraAssignsHelpers':to_variation_id/2 interns elements of "variation_id"; and 'Elixir.PhoenixStorybook.ExtraAssignsHelpers':to_value/4 interns raw string values for attributes declared as :atom or :boolean. BEAM atoms are never garbage-collected, so each unique attacker-controlled string is a permanent allocation. Once the atom table ceiling (~1,048,576 atoms) is reached, the entire BEAM node aborts, taking down all applications running on it. This issue affects phoenix_storybook from 0.2.0 before 1.1.0.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-20 | Updated 2026-05-20 | Assigner EEF




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-770 Allocation of Resources Without Limits or Throttling

Product status

Default status
unaffected

0.2.0 (semver) before 1.1.0
affected

Default status
unaffected

0228669d55c23a754d1ef11f49a32121129d5395 (git) before 96d524690af0fe197a49f60d18e564a620b9ef81
affected

Credits

Peter Ullrich finder

Christian Blavier remediation developer

Jonatan Männchen analyst

References

github.com/...rybook/security/advisories/GHSA-833p-95jq-929q vendor-advisory related

cna.erlef.org/cves/CVE-2026-8469.html related

osv.dev/vulnerability/EEF-CVE-2026-8469 related

github.com/...ommit/96d524690af0fe197a49f60d18e564a620b9ef81 patch

cve.org (CVE-2026-8469)

nvd.nist.gov (CVE-2026-8469)

Download JSON