CVE-2026-42786 PUBLISHED

WebSocket fragmented message reassembly unbounded in bandit

Assigner: EEF
Reserved: 29.04.2026 Published: 01.05.2026 Updated: 02.05.2026

Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion.

The fragment reassembly path in 'Elixir.Bandit.WebSocket.Connection':handle_frame/3 in lib/bandit/websocket/connection.ex appends every incoming Continuation{fin: false} frame's payload to a per-connection iolist with no cumulative size cap. The existing max_frame_size option only bounds individual frames; a peer that streams an unbounded number of continuation frames without ever setting fin=1 grows BEAM heap linearly until the OS or a supervisor kills the process.

Because the accumulation happens before WebSock.handle_in/2 is called, the application has no opportunity to interpose a size check. Phoenix Channels and LiveView both run over WebSock on Bandit, so a stock Phoenix application exposes this surface as soon as it accepts socket connections.

This issue affects bandit: from 0.5.0 before 1.11.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor mtrudel
Product bandit
Versions Default: unaffected
  • affected from 0.5.0 to 1.11.0 (excl.)
Vendor mtrudel
Product bandit
Versions Default: unaffected
  • affected from 8909391f486d42138c5308410bc5ea49a65f4d46 to 1.11.0 (excl.)

Affected Configurations

The application must accept WebSocket connections. Applications that expose no WebSocket endpoints are not affected.

Credits

  • Peter Ullrich finder
  • Mat Trudel remediation developer
  • Jonatan Männchen analyst

References

Problem Types

  • CWE-770 Allocation of Resources Without Limits or Throttling CWE

Impacts

  • CAPEC-130 Excessive Allocation