🔐 CVE Alert

CVE-2026-8467

UNKNOWN 0.0

Unauthenticated remote code execution via HEEx template injection in phoenix_storybook playground

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Code Injection vulnerability in phenixdigital phoenix_storybook allows unauthenticated remote code execution via unsanitized attribute value interpolation in HEEx template generation. The psb-assign WebSocket event handler in 'Elixir.PhoenixStorybook.Story.PlaygroundPreviewLive':handle_event/3 accepts arbitrary attribute names and values from unauthenticated clients. These values are passed to 'Elixir.PhoenixStorybook.Helpers.ExtraAssignsHelpers':handle_set_variation_assign/3, which stores them verbatim. When rendering, 'Elixir.PhoenixStorybook.Rendering.ComponentRenderer':attributes_markup/1 interpolates binary attribute values directly into a HEEx template string as name="<val>" without escaping double quotes or HEEx expression delimiters. An attacker can supply a value containing a closing quote followed by a HEEx expression block (e.g. foo" injected={EXPR} bar="), which causes EXPR to be treated as an inline Elixir expression. The resulting template is compiled via EEx.compile_string/2 and executed via Code.eval_quoted_with_env/3 with full Kernel imports and no sandbox, giving the attacker arbitrary code execution on the server. This issue affects phoenix_storybook from 0.5.0 before 1.1.0.

CWE CWE-94
Vendor phenixdigital
Product phoenix_storybook
Published May 20, 2026
Stay Ahead of the Next One

Get instant alerts for phenixdigital phoenix_storybook

Be the first to know when new unknown vulnerabilities affecting phenixdigital phoenix_storybook are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

phenixdigital / phoenix_storybook
0.5.0 < 1.1.0
phenixdigital / phoenix_storybook
e35379dfe2ef1a71b141899e36f431017c55265d < 56ab8464d4375fa52db806148a06cce126ad481d

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/phenixdigital/phoenix_storybook/security/advisories/GHSA-55hg-8qxv-qj4p cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-8467.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-8467 github.com: https://github.com/phenixdigital/phoenix_storybook/commit/56ab8464d4375fa52db806148a06cce126ad481d

Credits

Nick Mykhailyshyn Cenk Kücük Christian Blavier Jonatan Männchen