{"containers":{"cna":{"affected":[{"collectionURL":"https://repo.hex.pm","cpes":["cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["Elixir.PhoenixStorybook.Rendering.ComponentRenderer","Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive","Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers"],"packageName":"phoenix_storybook","packageURL":"pkg:hex/phoenix_storybook","product":"phoenix_storybook","programFiles":["lib/phoenix_storybook/rendering/component_renderer.ex","lib/phoenix_storybook/live/story/playground_preview_live.ex","lib/phoenix_storybook/helpers/extra_assigns_helpers.ex"],"programRoutines":[{"name":"'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributes_markup/1"},{"name":"'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handle_event/3"},{"name":"'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handle_set_variation_assign/3"}],"repo":"https://github.com/phenixdigital/phoenix_storybook","vendor":"phenixdigital","versions":[{"lessThan":"1.1.0","status":"affected","version":"0.5.0","versionType":"semver"}]},{"collectionURL":"https://github.com","cpes":["cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["Elixir.PhoenixStorybook.Rendering.ComponentRenderer","Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive","Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers"],"packageName":"phenixdigital/phoenix_storybook","packageURL":"pkg:github/phenixdigital/phoenix_storybook","product":"phoenix_storybook","programFiles":["lib/phoenix_storybook/rendering/component_renderer.ex","lib/phoenix_storybook/live/story/playground_preview_live.ex","lib/phoenix_storybook/helpers/extra_assigns_helpers.ex"],"programRoutines":[{"name":"'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributes_markup/1"},{"name":"'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handle_event/3"},{"name":"'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handle_set_variation_assign/3"}],"repo":"https://github.com/phenixdigital/phoenix_storybook","vendor":"phenixdigital","versions":[{"lessThan":"56ab8464d4375fa52db806148a06cce126ad481d","status":"affected","version":"e35379dfe2ef1a71b141899e36f431017c55265d","versionType":"git"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0","versionStartIncluding":"0.5.0","vulnerable":true}],"negate":false,"operator":"OR"}]}],"credits":[{"lang":"en","type":"finder","value":"Nick Mykhailyshyn"},{"lang":"en","type":"analyst","value":"Cenk Kücük"},{"lang":"en","type":"remediation developer","value":"Christian Blavier"},{"lang":"en","type":"coordinator","value":"Jonatan Männchen"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Code Injection vulnerability in phenixdigital phoenix_storybook allows unauthenticated remote code execution via unsanitized attribute value interpolation in HEEx template generation.</p><p>The <tt>psb-assign</tt> WebSocket event handler in <tt>'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handle_event/3</tt> accepts arbitrary attribute names and values from unauthenticated clients. These values are passed to <tt>'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handle_set_variation_assign/3</tt>, which stores them verbatim. When rendering, <tt>'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributes_markup/1</tt> interpolates binary attribute values directly into a HEEx template string as <tt>name=\"&lt;val&gt;\"</tt> without escaping double quotes or HEEx expression delimiters. An attacker can supply a value containing a closing quote followed by a HEEx expression block (e.g. <tt>foo\" injected={EXPR} bar=\"</tt>), which causes <tt>EXPR</tt> to be treated as an inline Elixir expression. The resulting template is compiled via <tt>EEx.compile_string/2</tt> and executed via <tt>Code.eval_quoted_with_env/3</tt> with full <tt>Kernel</tt> imports and no sandbox, giving the attacker arbitrary code execution on the server.</p><p>This issue affects phoenix_storybook from 0.5.0 before 1.1.0.</p>"}],"value":"Code Injection vulnerability in phenixdigital phoenix_storybook allows unauthenticated remote code execution via unsanitized attribute value interpolation in HEEx template generation.\n\nThe psb-assign WebSocket event handler in 'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handle_event/3 accepts arbitrary attribute names and values from unauthenticated clients. These values are passed to 'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handle_set_variation_assign/3, which stores them verbatim. When rendering, 'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributes_markup/1 interpolates binary attribute values directly into a HEEx template string as name=\"<val>\" without escaping double quotes or HEEx expression delimiters. An attacker can supply a value containing a closing quote followed by a HEEx expression block (e.g. foo\" injected={EXPR} bar=\"), which causes EXPR to be treated as an inline Elixir expression. The resulting template is compiled via EEx.compile_string/2 and executed via Code.eval_quoted_with_env/3 with full Kernel imports and no sandbox, giving the attacker arbitrary code execution on the server.\n\nThis issue affects phoenix_storybook from 0.5.0 before 1.1.0."}],"impacts":[{"capecId":"CAPEC-242","descriptions":[{"lang":"en","value":"CAPEC-242 Code Injection"}]}],"metrics":[{"cvssV4_0":{"attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":9.5,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-20T13:35:29.018Z","orgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","shortName":"EEF"},"references":[{"tags":["vendor-advisory","related"],"url":"https://github.com/phenixdigital/phoenix_storybook/security/advisories/GHSA-55hg-8qxv-qj4p"},{"tags":["related"],"url":"https://cna.erlef.org/cves/CVE-2026-8467.html"},{"tags":["related"],"url":"https://osv.dev/vulnerability/EEF-CVE-2026-8467"},{"tags":["patch"],"url":"https://github.com/phenixdigital/phoenix_storybook/commit/56ab8464d4375fa52db806148a06cce126ad481d"}],"source":{"discovery":"EXTERNAL"},"title":"Unauthenticated remote code execution via HEEx template injection in phoenix_storybook playground","x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","assignerShortName":"EEF","cveId":"CVE-2026-8467","datePublished":"2026-05-20T13:35:29.018Z","dateReserved":"2026-05-13T11:44:40.790Z","dateUpdated":"2026-05-20T13:35:29.018Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}