CVE-2026-47068
Gravedad CVSS v4.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
20/05/2026
Última modificación:
20/05/2026
Descripción
*** Pendiente de traducción *** Authorization Bypass Through User-Controlled Key vulnerability in phenixdigital phoenix_storybook allows cross-session PubSub topic injection via a URL query parameter.<br />
<br />
&#39;Elixir.PhoenixStorybook.Story.ComponentIframeLive&#39;:handle_params/3 in lib/phoenix_storybook/live/story/component_iframe_live.ex reads a PubSub topic directly from params["topic"] and broadcasts {:component_iframe_pid, self()} on it with no check that the topic belongs to the requesting session. The shared PhoenixStorybook.PubSub is used to coordinate playground LiveViews with their iframes: a playground subscribes to a session-specific topic and uses the received iframe pid to direct subsequent control messages (variation state, theme switches, extra-assign payloads) via send/2. Because the iframe trusts the query parameter, an attacker who loads /storybook/iframe/?topic= causes their iframe process pid to be announced on the victim&#39;s topic. The victim&#39;s playground then addresses its private messages to the attacker&#39;s iframe process.<br />
<br />
This issue affects phoenix_storybook from 0.4.0 before 1.1.0.
Impacto
Puntuación base 4.0
2.30
Gravedad 4.0
BAJA



