Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-21621

Gravedad CVSS v4.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
05/03/2026
Última modificación:
05/03/2026

Descripción

*** Pendiente de traducción *** Incorrect Authorization vulnerability in hexpm hexpm/hexpm (&amp;#39;Elixir.HexpmWeb.API.OAuthController&amp;#39; module) allows Privilege Escalation.<br /> <br /> An API key created with read-only permissions (domain: "api", resource: "read") can be escalated to full write access under specific conditions.<br /> <br /> When exchanging a read-only API key via the OAuth client_credentials grant, the resource qualifier is ignored. The resulting JWT receives the broad "api" scope instead of the expected "api:read" scope. This token is therefore treated as having full API access.<br /> <br /> If an attacker is able to obtain a victim&amp;#39;s read-only API key and a valid 2FA (TOTP) code for the victim account, they can use the incorrectly scoped JWT to create a new full-access API key with unrestricted API permissions that does not expire by default and can perform write operations such as publishing, retiring, or modifying packages.<br /> <br /> This vulnerability is associated with program files lib/hexpm_web/controllers/api/oauth_controller.ex and program routines &amp;#39;Elixir.HexpmWeb.API.OAuthController&amp;#39;:validate_scopes_against_key/2.<br /> <br /> This issue affects hexpm: from 71829cb6f6559bcceb1ef4e43a2fb8cdd3af654b before 71c127afebb7ed7cc637eb231b98feb802d62999.