{"containers":{"cna":{"affected":[{"collectionURL":"https://repo.hex.pm","cpes":["cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["'Elixir.PhoenixStorybook.Story.ComponentIframeLive'"],"packageName":"phoenix_storybook","packageURL":"pkg:hex/phoenix_storybook","product":"phoenix_storybook","programFiles":["lib/phoenix_storybook/live/story/component_iframe_live.ex"],"programRoutines":[{"name":"'Elixir.PhoenixStorybook.Story.ComponentIframeLive':handle_params/3"}],"repo":"https://github.com/phenixdigital/phoenix_storybook","vendor":"phenixdigital","versions":[{"lessThan":"1.1.0","status":"affected","version":"0.4.0","versionType":"semver"}]},{"collectionURL":"https://github.com","cpes":["cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["'Elixir.PhoenixStorybook.Story.ComponentIframeLive'"],"packageName":"phenixdigital/phoenix_storybook","packageURL":"pkg:github/phenixdigital/phoenix_storybook","product":"phoenix_storybook","programFiles":["lib/phoenix_storybook/live/story/component_iframe_live.ex"],"programRoutines":[{"name":"'Elixir.PhoenixStorybook.Story.ComponentIframeLive':handle_params/3"}],"repo":"https://github.com/phenixdigital/phoenix_storybook","vendor":"phenixdigital","versions":[{"lessThan":"6ee03f1c738d4436dde1b066cf65c80663d489f5","status":"affected","version":"8c2c97b0f505780fee4069988bf86736f51d35d7","versionType":"git"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0","versionStartIncluding":"0.4.0","vulnerable":true}],"negate":false,"operator":"OR"}]}],"credits":[{"lang":"en","type":"finder","value":"Peter Ullrich"},{"lang":"en","type":"remediation developer","value":"Christian Blavier"},{"lang":"en","type":"analyst","value":"Jonatan Männchen"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Authorization Bypass Through User-Controlled Key vulnerability in phenixdigital phoenix_storybook allows cross-session PubSub topic injection via a URL query parameter.</p><p><tt>'Elixir.PhoenixStorybook.Story.ComponentIframeLive':handle_params/3</tt> in <tt>lib/phoenix_storybook/live/story/component_iframe_live.ex</tt> reads a PubSub topic directly from <tt>params[\"topic\"]</tt> and broadcasts <tt>{:component_iframe_pid, self()}</tt> on it with no check that the topic belongs to the requesting session. The shared <tt>PhoenixStorybook.PubSub</tt> is used to coordinate playground LiveViews with their iframes: a playground subscribes to a session-specific topic and uses the received iframe pid to direct subsequent control messages (variation state, theme switches, extra-assign payloads) via <tt>send/2</tt>. Because the iframe trusts the query parameter, an attacker who loads <tt>/storybook/iframe/&lt;story&gt;?topic=&lt;victim_topic&gt;</tt> causes their iframe process pid to be announced on the victim's topic. The victim's playground then addresses its private messages to the attacker's iframe process.</p><p>This issue affects phoenix_storybook from 0.4.0 before 1.1.0.</p>"}],"value":"Authorization Bypass Through User-Controlled Key vulnerability in phenixdigital phoenix_storybook allows cross-session PubSub topic injection via a URL query parameter.\n\n'Elixir.PhoenixStorybook.Story.ComponentIframeLive':handle_params/3 in lib/phoenix_storybook/live/story/component_iframe_live.ex reads a PubSub topic directly from params[\"topic\"] and broadcasts {:component_iframe_pid, self()} on it with no check that the topic belongs to the requesting session. The shared PhoenixStorybook.PubSub is used to coordinate playground LiveViews with their iframes: a playground subscribes to a session-specific topic and uses the received iframe pid to direct subsequent control messages (variation state, theme switches, extra-assign payloads) via send/2. Because the iframe trusts the query parameter, an attacker who loads /storybook/iframe/<story>?topic=<victim_topic> causes their iframe process pid to be announced on the victim's topic. The victim's playground then addresses its private messages to the attacker's iframe process.\n\nThis issue affects phoenix_storybook from 0.4.0 before 1.1.0."}],"impacts":[{"capecId":"CAPEC-12","descriptions":[{"lang":"en","value":"CAPEC-12 Choosing Message Identifier"}]}],"metrics":[{"cvssV4_0":{"attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":2.3,"baseSeverity":"LOW","privilegesRequired":"NONE","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-639","description":"CWE-639 Authorization Bypass Through User-Controlled Key","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-20T13:35:33.215Z","orgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","shortName":"EEF"},"references":[{"tags":["vendor-advisory","related"],"url":"https://github.com/phenixdigital/phoenix_storybook/security/advisories/GHSA-mrhx-6pw9-q5fh"},{"tags":["related"],"url":"https://cna.erlef.org/cves/CVE-2026-47068.html"},{"tags":["related"],"url":"https://osv.dev/vulnerability/EEF-CVE-2026-47068"},{"tags":["patch"],"url":"https://github.com/phenixdigital/phoenix_storybook/commit/6ee03f1c738d4436dde1b066cf65c80663d489f5"}],"source":{"discovery":"EXTERNAL"},"title":"Cross-session PubSub topic injection via URL parameter in phoenix_storybook","x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","assignerShortName":"EEF","cveId":"CVE-2026-47068","datePublished":"2026-05-20T13:35:33.215Z","dateReserved":"2026-05-18T17:28:08.321Z","dateUpdated":"2026-05-20T13:35:33.215Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}