EEF-CVE-2026-32145

Source
https://cna.erlef.org/osv/EEF-CVE-2026-32145.html
Import Source
https://cna.erlef.org/osv/EEF-CVE-2026-32145.json
JSON Data
https://api.osv.dev/v1/vulns/EEF-CVE-2026-32145
Aliases
  • CVE-2026-32145
  • GHSA-8645-p2v4-73r2
Published
2026-04-02T10:30:47.485Z
Modified
2026-04-02T13:26:27.337139651Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Multipart form body parser bypasses body size limits in wisp
Details

Allocation of Resources Without Limits or Throttling vulnerability in gleam-wisp wisp allows a denial of service via multipart form body parsing.

The multipartbody function bypasses configured maxbodysize and maxfilessize limits. When a multipart boundary is not present in a chunk, the parser takes the MoreRequiredForBody path, which appends the chunk to the output but passes the quota unchanged to the recursive call. Only the final chunk containing the boundary is counted via decrementquota. The same pattern exists in multipartheaders, where MoreRequiredForHeaders recurses without calling decrementbody_quota.

An unauthenticated attacker can exhaust server memory or disk by sending arbitrarily large multipart form submissions in a single HTTP request.

This issue affects wisp: from 0.2.0 before 2.2.2.

Database specific
{
    "cwe_ids": [
        "CWE-770"
    ],
    "cpe_ids": [
        "cpe:2.3:a:gleam-wisp:wisp:*:*:*:*:*:*:*:*"
    ],
    "capec_ids": [
        "CAPEC-130"
    ]
}
References
Credits
    • John Downey - FINDER
    • Louis Pilfold - REMEDIATION_DEVELOPER

Affected packages

Hex / wisp

Package

Name
wisp
Purl
pkg:hex/wisp

Affected ranges

Type
SEMVER
Events
Introduced
0.2.0
Fixed
2.2.2

Affected versions

0.*
0.2.0
0.3.0
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0
0.9.0
0.10.0
0.11.0
0.12.0
0.13.0
0.14.0
0.15.0
0.16.0
1.*
1.0.0
1.1.0
1.2.0
1.3.0
1.4.0
1.5.1
1.5.2
1.5.3
1.6.0
1.7.0
1.8.0
2.*
2.0.0-rc1
2.0.0
2.0.1
2.1.0
2.1.1
2.2.0
2.2.1

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-32145.json"

Git / github.com/gleam-wisp/wisp.git

Affected ranges

Type
GIT
Repo
https://github.com/gleam-wisp/wisp.git
Events

Affected versions

v0.*
v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.14.0
v0.15.0
v0.16.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0
v1.*
v1.0.0
v1.1.0
v1.2.0
v1.3.0
v1.4.0
v1.5.1
v1.5.2
v1.5.3
v1.6.0
v1.7.0
v1.8.0
v2.*
v2.0.0
v2.0.0-rc1
v2.0.1
v2.1.0
v2.1.1
v2.2.0
v2.2.1

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-32145.json"