Description
Uncontrolled Resource Consumption vulnerability in hexpm hexpm/hexpm allows Excessive Allocation. Publishing an oversized package can cause Hex.pm to run out of memory while extracting the uploaded package tarball. This can terminate the affected application instance and result in a denial of service for package publishing and potentially other package-processing functionality.

This issue affects hexpm: before 495f01607d3eae4aed7ad09b2f54f31ec7a7df01; hex.pm: before 2026-03-10.
Published: 2026-03-13
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

The vulnerability allows an attacker to exhaust the memory of the Hex.pm service by uploading an oversized package tarball. During extraction, the service consumes uncontrolled amounts of memory, eventually crashing the application instance and halting package publishing and other processing functions. The primary consequence is a complete service disruption for any affected deployments.

Affected Systems

Affected versions include hexpm:hex.pm before commit 495f01607d3eae4aed7ad09b2f54f31ec7a7df01 and hexpm:hexpm before 2026‑03‑10. These releases run the Hex.pm platform that hosts Elixir packages and are therefore susceptible to the denial‑of‑service noted above.

Risk and Exploitability

CVSS score 7.1 indicates a medium‑to‑high impact, but the EPSS score is below 1%, suggesting low current exploitation likelihood, and the vulnerability is not listed in the KEV catalog. Attackers would need the ability to publish a package; by sending an oversized upload to the Hex.pm endpoint, the memory exhaustion can be triggered. While the risk is moderate, any successful exploitation would cause a full service outage for the affected instance.

Generated by OpenCVE AI on March 20, 2026 at 20:52 UTC.

Remediation

Vendor Workaround

* Prevent large package uploads by enforcing upload size limits at the reverse proxy or load balancer level.


OpenCVE Recommended Actions

  • Update Hex.pm to commit 495f01607d3eae4aed7ad09b2f54f31ec7a7df01 or later to address the excess allocation issue
  • Enforce strict upload size limits at the reverse proxy or load balancer to block oversized package submissions

Generated by OpenCVE AI on March 20, 2026 at 20:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 16:45:00 +0000


Fri, 20 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Hex
Hex hexpm
CPEs cpe:2.3:a:hex:hexpm:*:*:*:*:*:*:*:*
Vendors & Products Hex
Hex hexpm
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled Resource Consumption vulnerability in hexpm hexpm/hexpm allows Excessive Allocation. Publishing an oversized package can cause Hex.pm to run out of memory while extracting the uploaded package tarball. This can terminate the affected application instance and result in a denial of service for package publishing and potentially other package-processing functionality. This issue affects hexpm: before 495f01607d3eae4aed7ad09b2f54f31ec7a7df01; hex.pm: before 2026-03-10.
Title Denial of Service via Oversized Package Upload
First Time appeared Hexpm
Hexpm hexpm
Weaknesses CWE-400
CPEs cpe:2.3:a:hexpm:hexpm:*:*:*:*:*:*:*:*
Vendors & Products Hexpm
Hexpm hexpm
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: EEF

Published:

Updated: 2026-04-06T16:44:14.100Z

Reserved: 2026-01-19T14:23:14.343Z

Link: CVE-2026-23940

cve-icon Vulnrichment

Updated: 2026-03-16T17:06:21.933Z

cve-icon NVD

Status : Modified

Published: 2026-03-13T19:54:14.640

Modified: 2026-04-06T17:17:08.123

Link: CVE-2026-23940

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:39:44Z

Weaknesses