GHSA-8645-p2v4-73r2

Suggest an improvement
Source
https://github.com/advisories/GHSA-8645-p2v4-73r2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-8645-p2v4-73r2/GHSA-8645-p2v4-73r2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8645-p2v4-73r2
Aliases
Published
2026-04-03T03:40:30Z
Modified
2026-04-06T23:32:52.065422Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
wisp has Allocation of Resources Without Limits or Throttling
Details

Summary

A multipart form parsing bug allows any unauthenticated user to bypass configured request size limits and trigger a denial of service by exhausting server memory or disk.

Details

The issue is in the multipart parsing logic, specifically in multipart_body and multipart_headers.

When parsing multipart data, the implementation distinguishes between: - chunks where a boundary is found - chunks where more data is required

In the normal case (boundary found), the parser correctly accounts for consumed bytes by calling decrement_quota.

However, in the MoreRequiredForBody branch, the parser appends incoming data to the output but recurses without decrementing the quota. This means that any chunk that does not contain the multipart boundary is effectively “free” from a quota perspective. Only the final chunk, the one containing the boundary, is counted.

The same pattern exists in multipart_headers, where MoreRequiredForHeaders also recurses without decrementing the quota.

As a result, an attacker can send arbitrarily large multipart bodies split across many chunks that avoid the boundary. The parser will accumulate the data (in memory for form fields, on disk for file uploads) without enforcing max_body_size or max_files_size.

Impact

This is a denial of service vulnerability caused by uncontrolled resource consumption.

Any application using require_form or require_multipart_form on user-controlled input is affected. An unauthenticated attacker can send large multipart requests that bypass configured limits and cause:

  • memory exhaustion (for form fields accumulated in memory)
  • disk exhaustion (for file uploads written to temporary storage)

In both cases, the application may become unavailable or be terminated by the operating system.

Workaround

Deploy a reverse proxy (such as nginx or HAProxy) in front of the application and enforce request body size limits there. This ensures large multipart requests are rejected before they reach the vulnerable parser.

Resources

  • Introducing commit: https://github.com/gleam-wisp/wisp/commit/d8e722e22ccb42bda9d0b6248658d37ab4e9b376
  • Fix commit: https://github.com/gleam-wisp/wisp/commit/7a978748e12ab29db232c222254465890e1a4a90
Database specific
{
    "nvd_published_at": "2026-04-02T11:16:21Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-770"
    ],
    "github_reviewed_at": "2026-04-03T03:40:30Z"
}
References

Affected packages

Hex / wisp

Package

Name
wisp
Purl
pkg:hex/wisp

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.2

Affected versions

0.*
0.1.0
0.2.0
0.3.0
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0
0.9.0
0.10.0
0.11.0
0.12.0
0.13.0
0.14.0
0.15.0
0.16.0
1.*
1.0.0
1.1.0
1.2.0
1.3.0
1.4.0
1.5.1
1.5.2
1.5.3
1.6.0
1.7.0
1.8.0
2.*
2.0.0-rc1
2.0.0
2.0.1
2.1.0
2.1.1
2.2.0
2.2.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-8645-p2v4-73r2/GHSA-8645-p2v4-73r2.json"