hex_core has Unsafe Deserialization of Erlang Terms
Description
Published by the National Vulnerability Database
Feb 27, 2026
Published to the GitHub Advisory Database
Mar 1, 2026
Reviewed
Mar 1, 2026
Last updated
Apr 6, 2026
Impact
The Hex client (
hex_core) deserializes Erlang terms received from the Hex API usingbinary_to_term/1without sufficient restrictions.If an attacker can control the HTTP response body returned by the Hex API, this allows denial-of-service attacks such as atom table exhaustion, leading to a VM crash. No released versions are known to allow remote code execution.
Patches
Workarounds
Ensure that the Hex API URL (
HEX_API_URL) points only to trusted endpoints. There is no client-side workaround that fully mitigates this issue without applying the patch.Resources
References