{"affected":[{"ranges":[{"events":[{"introduced":"617e44c71f1dd9043870205f371d375c5c4d886d"},{"fixed":"c692438684ead90c3bcbfb9ccf4e63c768c668a8"}],"repo":"https://github.com/hexpm/hexpm.git","type":"GIT"}]}],"aliases":["GHSA-6cw9-5gg4-rhpj","CVE-2026-21618"],"credits":[{"name":"Joud Zakharia / zentrust partners GmbH","type":"FINDER"},{"name":"Jonatan Männchen / EEF","type":"REMEDIATION_DEVELOPER"},{"name":"Eric Meadows-Jönsson / Hex.pm","type":"REMEDIATION_REVIEWER"}],"database_specific":{"capec_ids":["CAPEC-63"],"cpe_ids":["cpe:2.3:a:hexpm:hexpm:*:*:*:*:*:*:*:*"],"cwe_ids":["CWE-79"]},"details":"## Summary\n\nImproper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in hexpm hexpm/hexpm ('Elixir.HexpmWeb.SharedAuthorizationView' modules) allows Cross-Site Scripting (XSS). This vulnerability is associated with program files lib/hexpm_web/views/shared_authorization_view.ex and program routines 'Elixir.HexpmWeb.SharedAuthorizationView':render_grouped_scopes/3.\n\nThis issue affects hexpm: from 617e44c71f1dd9043870205f371d375c5c4d886d before c692438684ead90c3bcbfb9ccf4e63c768c668a8, from pkg:github/hexpm/hexpm@617e44c71f1dd9043870205f371d375c5c4d886d before pkg:github/hexpm/hexpm@c692438684ead90c3bcbfb9ccf4e63c768c668a8; hex.pm: from 2025-10-01 before 2026-01-19.","id":"EEF-CVE-2026-21618","modified":"2026-04-06T16:44:10.863Z","published":"2026-01-19T14:22:46.770Z","references":[{"type":"ADVISORY","url":"https://github.com/hexpm/hexpm/security/advisories/GHSA-6cw9-5gg4-rhpj"},{"type":"WEB","url":"https://cna.erlef.org/cves/CVE-2026-21618.html"},{"type":"FIX","url":"https://github.com/hexpm/hexpm/commit/c692438684ead90c3bcbfb9ccf4e63c768c668a8"}],"related":[],"schema_version":"1.7.3","severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N","type":"CVSS_V4"}],"summary":"Cross-site scripting (XSS) in OAuth Device Authorization screen","upstream":[]}