Impact
A race condition in elixir-nodejs allows a stale response from the worker protocol, returning data that belongs to another user. The worker does not verify request-response correlation, so under high load or chronic timeout conditions the next available data in the buffer can be sent to an unrelated caller. The flaw can expose sensitive user information such as personally identifiable data, authentication credentials, or private records, and the denial of a clear error makes the misuse hard to trace.
Affected Systems
Revelry Labs elixir‑nodejs is affected in all versions prior to v3.1.4. Any deployments using those releases, especially those operating in high‑throughput or multi‑user environments, are at risk.
Risk and Exploitability
The issue has a CVSS score of 7.1, indicating a high risk of data compromise. The Exploit Prediction Scoring System score is not published, but the vulnerability is not listed in CISA’s KEV catalog. The attack is most likely achievable from within the application context by inducing concurrent requests or timed out operations; an adversary would need to jam traffic or exploit a busy server to trigger the race condition. Once exploited, the impact includes unauthorized disclosure of confidential data, with significant potential harm to users and the organization.
OpenCVE Enrichment
Github GHSA