CVE-2026-21619
Unsafe Deserialization of Erlang Terms in hex_core
Vulnerability description
Uncontrolled Resource Consumption, Deserialization of Untrusted Data vulnerability in hexpm hex_core (hex_api modules), hexpm hex (mix_hex_api modules), erlang rebar3 (r3_hex_api modules) allows Object Injection, Excessive Allocation.This vulnerability is associated with program files src/hex_api.erl, src/mix_hex_api.erl, apps/rebar/src/vendored/r3_hex_api.erl and program routines hex_core:request/4, mix_hex_api:request/4, r3_hex_api:request/4.
This issue affects hex_core: from 0.1.0 before 0.12.1; hex: from 2.3.0 before 2.3.2; rebar3: from 3.9.1 before 3.27.0.
Affected
pkg:github/hexpm/hex_core
| Module | Source File | Routine |
|---|---|---|
hex_api
|
src/hex_api.erl
|
hex_core:request/4
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | git ⓘ | eb327f8edfe4
|
< cdf726095bca
|
pkg:hex/hex_core
| Module | Source File | Routine |
|---|---|---|
hex_api
|
src/hex_api.erl
|
hex_core:request/4
|
pkg:github/hexpm/hex
| Module | Source File | Routine |
|---|---|---|
mix_hex_api
|
src/mix_hex_api.erl
|
mix_hex_api:request/4
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | git ⓘ | 314546ac4322
|
< 636739f33225
|
pkg:otp/hex
| Module | Source File | Routine |
|---|---|---|
mix_hex_api
|
src/mix_hex_api.erl
|
mix_hex_api:request/4
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | semver ⓘ | 2.3.0
|
< 2.3.2
|
pkg:github/erlang/rebar3
| Module | Source File | Routine |
|---|---|---|
r3_hex_api
|
apps/rebar/src/vendored/r3_hex_api.erl
|
r3_hex_api:request/4
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | git ⓘ | 209c02ec57c2
|
< 1d4478f527e3
|
pkg:otp/rebar3
| Module | Source File | Routine |
|---|---|---|
r3_hex_api
|
apps/rebar/src/vendored/r3_hex_api.erl
|
r3_hex_api:request/4
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | semver ⓘ | 3.9.1
|
< 3.27.0
|
References
- https://github.com/hexpm/hex_core/security/advisories/GHSA-hx9w-f2w9-9g96 vendor-advisory
- https://github.com/hexpm/hex_core/commit/cdf726095bca85ad2549d146df1e831ae93c2b13 patch
- https://github.com/hexpm/hex/commit/636739f3322514e9303ca335fb630696fcbb3c95 patch
- https://github.com/erlang/rebar3/commit/1d4478f527e373de0b225951e53115450e0d9b9d patch
Credits
- Finder: Michael Lubas / Paraxial.ia
- Remediation developer: Jonatan Männchen / EEF
- Remediation reviewer: Eric Meadows-Jönsson / Hex.pm
CVE record as JSON:
GET /cves/CVE-2026-21619.json
OSV record as JSON:
GET /osv/EEF-CVE-2026-21619.json