This issue does NOT affect hex.pm the service. Only self-hosted deployments using the Local Storage backend are affected.
This issue affects hexpm: from 931ee0ed46fa89218e0400a4f6e6d15f96406050 before 5d2ccd2f14f45a63225a73fb5b1c937baf36fdc0.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
* Avoid the local file store backend in any exposed environment. * Restrict network access to the registry when using the local backend. * Production deployments should use object storage (e.g., S3-compatible backends) instead of the local filesystem store.
Thu, 26 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in hexpm hexpm/hexpm ('Elixir.Hexpm.Store.Local' module) allows Relative Path Traversal. This vulnerability is associated with program files lib/hexpm/store/local.ex and program routines 'Elixir.Hexpm.Store.Local':get/3, 'Elixir.Hexpm.Store.Local':put/4, 'Elixir.Hexpm.Store.Local':delete/2, 'Elixir.Hexpm.Store.Local':delete_many/2. This issue does NOT affect hex.pm the service. Only self-hosted deployments using the Local Storage backend are affected. This issue affects hexpm: from 931ee0ed46fa89218e0400a4f6e6d15f96406050 before 5d2ccd2f14f45a63225a73fb5b1c937baf36fdc0. | |
| Title | Path Traversal in Local File Store Backend | |
| First Time appeared |
Hexpm
Hexpm hexpm |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:hexpm:hexpm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Hexpm
Hexpm hexpm |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: EEF
Published:
Updated: 2026-02-26T20:24:24.772Z
Reserved: 2026-01-19T14:23:14.343Z
Link: CVE-2026-23939
No data.
Status : Received
Published: 2026-02-26T20:31:35.763
Modified: 2026-02-26T20:31:35.763
Link: CVE-2026-23939
No data.
OpenCVE Enrichment
No data.