The Hex client (hex_core) deserializes Erlang terms received from the Hex API using binary_to_term/1 without sufficient restrictions.
If an attacker can control the HTTP response body returned by the Hex API, this allows denial-of-service attacks such as atom table exhaustion, leading to a VM crash. No released versions are known to allow remote code execution.
Ensure that the Hex API URL (HEX_API_URL) points only to trusted endpoints. There is no client-side workaround that fully mitigates this issue without applying the patch.
{
"nvd_published_at": "2026-02-27T18:16:11Z",
"severity": "LOW",
"github_reviewed": true,
"cwe_ids": [
"CWE-400"
],
"github_reviewed_at": "2026-03-01T01:25:35Z"
}