elixir-nodejs has Cross-User Data Leakage or Information Disclosure due to Worker Protocol Race Condition
High severity
GitHub Reviewed
Published
Mar 24, 2026
in
revelrylabs/elixir-nodejs
•
Updated Mar 27, 2026
Description
Published to the GitHub Advisory Database
Mar 26, 2026
Reviewed
Mar 26, 2026
Published by the National Vulnerability Database
Mar 27, 2026
Last updated
Mar 27, 2026
Impact
This vulnerability results in Cross-User Data Leakage or Information Disclosure due to a race condition in the worker protocol.
The lack of request-response correlation creates a "stale response" vulnerability. Because the worker does not verify which request a response belongs to, it may return the next available data in the buffer to an unrelated caller.
In high-throughput environments where the library processes sensitive user data (e.g., PII, authentication tokens, or private records), a timeout or high concurrent load can cause Data A (belonging to User A) to be returned to User B.
This may lead to unauthorized information disclosure that is difficult to trace, as the application may not throw an error but instead provide "valid-looking" yet entirely incorrect and private data to the wrong session.
Patches
fixed in v3.1.4
Resources
revelrylabs/elixir-nodejs#100
revelrylabs/elixir-nodejs#105
References