Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32689— Long-poll NDJSON body splitting causes unbounded memory allocation in Phoenix

EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32689

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Long-poll NDJSON body splitting causes unbounded memory allocation in Phoenix
Source: NVD (National Vulnerability Database)
Vulnerability Description
Allocation of Resources Without Limits or Throttling vulnerability in phoenixframework phoenix allows a denial of service via the long-poll transport's NDJSON body handling. In 'Elixir.Phoenix.Transports.LongPoll':publish/4, when a POST request is received with Content-Type: application/x-ndjson, the request body is split on newline characters using String.split/2 with no limit on the number of resulting segments. An attacker can send a body consisting entirely of newline bytes, causing a 1:1 amplification into a list of empty binaries — a 1 MB body produces approximately one million list elements, an 8 MB body approximately 8.4 million. Each element is then walked by Enum.map, materializing another list of the same size. This exhausts BEAM memory and schedulers, crashing the node and terminating all active sessions. A session token required to reach the vulnerable endpoint is freely obtainable by any client via an unauthenticated GET request to the same URL with a matching Origin header, making this attack effectively unauthenticated. This issue affects phoenix: from 1.7.0 before 1.7.22 and 1.8.6.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
phoenix 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
phoenix是Phoenix framework开源的一款Web开发框架。 phoenix 1.7.0至1.7.22之前版本和1.8.6版本存在安全漏洞,该漏洞源于长轮询传输的NDJSON主体处理中资源分配无限制,可能导致拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
phoenixframeworkphoenix 1.7.0 ~ 1.7.22 cpe:2.3:a:phoenixframework:phoenix:*:*:*:*:*:*:*:*
phoenixframeworkphoenix 2674c6ea30634667f9b09966b90269393b445953 ~ * cpe:2.3:a:phoenixframework:phoenix:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-32689

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32689

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-32689

No comments yet


Leave a comment