EEF-CVE-2026-8467

Source
https://cna.erlef.org/osv/EEF-CVE-2026-8467.html
Import Source
https://cna.erlef.org/osv/EEF-CVE-2026-8467.json
JSON Data
https://api.osv.dev/v1/vulns/EEF-CVE-2026-8467
Aliases
  • CVE-2026-8467
  • GHSA-55hg-8qxv-qj4p
Published
2026-05-20T13:35:29.018Z
Modified
2026-05-20T13:56:23.273071966Z
Severity
  • 9.5 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
Unauthenticated remote code execution via HEEx template injection in phoenix_storybook playground
Details

Summary

Code Injection vulnerability in phenixdigital phoenix_storybook allows unauthenticated remote code execution via unsanitized attribute value interpolation in HEEx template generation.

The psb-assign WebSocket event handler in 'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handleevent/3 accepts arbitrary attribute names and values from unauthenticated clients. These values are passed to 'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handlesetvariationassign/3, which stores them verbatim. When rendering, 'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributesmarkup/1 interpolates binary attribute values directly into a HEEx template string as name="<val>" without escaping double quotes or HEEx expression delimiters. An attacker can supply a value containing a closing quote followed by a HEEx expression block (e.g. foo" injected={EXPR} bar="), which causes EXPR to be treated as an inline Elixir expression. The resulting template is compiled via EEx.compilestring/2 and executed via Code.evalquotedwith_env/3 with full Kernel imports and no sandbox, giving the attacker arbitrary code execution on the server.

This issue affects phoenix_storybook from 0.5.0 before 1.1.0.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ],
    "capec_ids": [
        "CAPEC-242"
    ],
    "cpe_ids": [
        "cpe:2.3:a:phenixdigital:phoenix_storybook:*:*:*:*:*:*:*:*"
    ]
}
References
Credits
    • Nick Mykhailyshyn - FINDER
    • Cenk Kücük - ANALYST
    • Christian Blavier - REMEDIATION_DEVELOPER
    • Jonatan Männchen - COORDINATOR

Affected packages

Hex / phoenix_storybook

Package

Name
phoenix_storybook
Purl
pkg:hex/phoenix_storybook

Affected ranges

Type
SEMVER
Events
Introduced
0.5.0
Fixed
1.1.0

Affected versions

0.*
0.5.0
0.5.1
0.5.2
0.5.3
0.5.4
0.5.5
0.5.6
0.5.7
0.6.0
0.6.1
0.6.2
0.6.3
0.6.4
0.7.0
0.7.1
0.7.2
0.8.0
0.8.1
0.8.2
0.8.3
0.9.0
0.9.1
0.9.2
0.9.3
1.*
1.0.0

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-8467.json"

Git / github.com/phenixdigital/phoenix_storybook

Affected ranges

Type
GIT
Repo
https://github.com/phenixdigital/phoenix_storybook
Events

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-8467.json"