CVE-2026-32688
Description
Allocation of Resources Without Limits or Throttling vulnerability in elixir-plug plug_cowboy allows unauthenticated remote denial of service via atom table exhaustion.
Plug.Cowboy.Conn.conn/1 in lib/plug/cowboy/conn.ex calls String.to_atom/1 on the value returned by :cowboy_req.scheme/1. For HTTP/2 connections, cowlib passes the client-supplied :scheme pseudo-header value through verbatim without validation. Each unique value permanently allocates a new entry in the BEAM atom table. Since atoms are never garbage-collected and the atom table has a fixed limit (default 1,048,576), an unauthenticated attacker can exhaust the table by sending HTTP/2 requests with unique :scheme values, causing the Erlang VM to abort with system_limit and taking down the entire node.
This vulnerability does not affect HTTP/1.1, where cowboy derives the scheme from the listener type rather than from a client-supplied header.
This issue affects plug_cowboy: from 2.0.0 before 2.8.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
plug_cowboyHex | >= 2.0.0, < 2.8.1 | 2.8.1 |
Affected products
1Patches
1bfb34cb45eb3Merge commit from fork
1 file changed · +7 −1
lib/plug/cowboy/conn.ex+7 −1 modified@@ -15,6 +15,12 @@ defmodule Plug.Cowboy.Conn do peer: {remote_ip, _} } = req + scheme = + case :cowboy_req.scheme(req) do + "http" -> :http + "https" -> :https + end + %Plug.Conn{ adapter: {__MODULE__, Map.put(req, :plug_pid, self())}, host: host, @@ -26,7 +32,7 @@ defmodule Plug.Cowboy.Conn do query_string: qs, req_headers: to_headers_list(headers), request_path: path, - scheme: String.to_atom(:cowboy_req.scheme(req)) + scheme: scheme } end
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-q8x4-x7mp-5vg2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32688ghsaADVISORY
- cna.erlef.org/cves/CVE-2026-32688.htmlnvdWEB
- github.com/elixir-plug/plug_cowboy/commit/bfb34cb45eb354e56437f7023fb306de1bf9c19bnvdWEB
- github.com/elixir-plug/plug_cowboy/security/advisories/GHSA-q8x4-x7mp-5vg2nvdWEB
- osv.dev/vulnerability/EEF-CVE-2026-32688nvdWEB
News mentions
0No linked articles in our index yet.