Allocation of Resources Without Limits or Throttling Affecting phoenix package, versions >=1.7.0 <1.7.22>=1.8.0 <1.8.6


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-PHOENIX-16425773
  • published6 May 2026
  • disclosed5 May 2026
  • creditPeter Ullrich

Introduced: 5 May 2026

NewCVE-2026-32689  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade phoenix to version 1.7.22, 1.8.6 or higher.

Overview

phoenix is a The official JavaScript client for the Phoenix web framework.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the Elixir.Phoenix.Transports.LongPoll POST requests handling with Content-Type: application/x-ndjson. An attacker can exhaust system memory and schedulers, leading to a crash and termination of all active sessions by sending a large request body consisting entirely of newline bytes, which is split into a massive list of empty binaries and further processed without limits.

Note:

  1. This is only exploitable if the longpoll transport is enabled on any Phoenix.Socket declaration, including the LiveView /live socket.

  2. Longpoll is enabled for newly generated Phoenix projects since Phoenix 1.7.11.

Workaround

This vulnerability can be mitigated by disabling the longpoll transport on all Phoenix.Socket declarations, including the LiveView /live socket, by removing or setting longpoll: false. Note that this prevents clients that cannot use WebSockets from connecting.

CVSS Base Scores

version 4.0
version 3.1