Vulnerability description

Uncontrolled Resource Consumption, Deserialization of Untrusted Data vulnerability in hexpm hex_core (hex_api modules), hexpm hex (mix_hex_api modules), erlang rebar3 (r3_hex_api modules) allows Object Injection, Excessive Allocation.

This vulnerability is associated with program files src/hex_api.erl, src/mix_hex_api.erl, apps/rebar/src/vendored/r3_hex_api.erl and program routines hex_core:request/4, mix_hex_api:request/4, r3_hex_api:request/4.

This issue affects hex_core: from 0.1.0 before 0.12.1; hex: from 2.3.0 before 2.3.2; rebar3: from 3.9.1 before 3.27.0.

Affected

pkg:github/hexpm/hex_core

Module Source File Routine
hex_api src/hex_api.erl hex_core:request/4
Status Type Version Changes / Fixed in
affected git eb327f8edfe4 < cdf726095bca

pkg:hex/hex_core

Module Source File Routine
hex_api src/hex_api.erl hex_core:request/4
Status Type Version Changes / Fixed in
affected semver 0.1.0 < 0.12.1

pkg:github/hexpm/hex

Module Source File Routine
mix_hex_api src/mix_hex_api.erl mix_hex_api:request/4
Status Type Version Changes / Fixed in
affected git 314546ac4322 < 636739f33225

pkg:otp/hex

Module Source File Routine
mix_hex_api src/mix_hex_api.erl mix_hex_api:request/4
Status Type Version Changes / Fixed in
affected semver 2.3.0 < 2.3.2

pkg:github/erlang/rebar3

Module Source File Routine
r3_hex_api apps/rebar/src/vendored/r3_hex_api.erl r3_hex_api:request/4
Status Type Version Changes / Fixed in
affected git 209c02ec57c2 < 1d4478f527e3

pkg:otp/rebar3

Module Source File Routine
r3_hex_api apps/rebar/src/vendored/r3_hex_api.erl r3_hex_api:request/4
Status Type Version Changes / Fixed in
affected semver 3.9.1 < 3.27.0

References

Credits

  • Finder: Michael Lubas / Paraxial.ia
  • Remediation developer: Jonatan Männchen / EEF
  • Remediation reviewer: Eric Meadows-Jönsson / Hex.pm

CVE record as JSON:  GET /cves/CVE-2026-21619.json
OSV record as JSON:  GET /osv/EEF-CVE-2026-21619.json