CVE-2026-21619

NameCVE-2026-21619
DescriptionUncontrolled Resource Consumption, Deserialization of Untrusted Data vulnerability in hexpm hex_core (hex_api modules), hexpm hex (mix_hex_api modules), erlang rebar3 (r3_hex_api modules) allows Object Injection, Excessive Allocation. This vulnerability is associated with program files src/hex_api.erl, src/mix_hex_api.erl, apps/rebar/src/vendored/r3_hex_api.erl and program routines hex_core:request/4, mix_hex_api:request/4, r3_hex_api:request/4. This issue affects hex_core: from 0.1.0 before 0.12.1; hex: from 2.3.0 before 2.3.2; rebar3: from 3.9.1 before 3.27.0.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang-hex (PTS)forky, sid, trixie2.0.6-2vulnerable
rebar3 (PTS)bookworm3.19.0-1vulnerable
trixie3.24.0-1vulnerable
forky, sid3.27.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlang-hexsource(unstable)(unfixed)
rebar3source(unstable)3.27.0-1

Notes

https://github.com/advisories/GHSA-hx9w-f2w9-9g96
https://github.com/hexpm/hex_core/commit/cdf726095bca85ad2549d146df1e831ae93c2b13 (v0.12.1)
https://github.com/hexpm/hex/commit/636739f3322514e9303ca335fb630696fcbb3c95 (v2.3.2)
https://github.com/erlang/rebar3/commit/1d4478f527e373de0b225951e53115450e0d9b9d (3.27.0)

Search for package or bug name: Reporting problems