Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8466
PUBLISHED
More InfoOfficial Page
Assigner-EEF
Assigner Org ID-6b3ad84c-e1a6-4bf7-a703-f496b71e49db
View Known Exploited Vulnerability (KEV) details
Published At-13 May, 2026 | 18:26
Updated At-14 May, 2026 | 04:30
Rejected At-
▼CVE Numbering Authority (CNA)
Unbounded buffer accumulation in multipart header parsing causes denial of service in cowboy

Allocation of Resources Without Limits or Throttling vulnerability in ninenines cowboy allows denial of service via unbounded buffer accumulation in multipart header parsing. cowboy_req:read_part/3 in src/cowboy_req.erl accumulates incoming request bytes into a Buffer binary with no upper-bound check. When cow_multipart:parse_headers/2 returns more or {more, Buffer2}, the function reads up to Length bytes (default 64 KB) from the request body and recurses with the enlarged buffer. There is no equivalent of the byte_size(Acc) > Length guard present in the sibling function read_part_body/4. An unauthenticated attacker can send a multipart/form-data request whose body never yields a complete header section — for example, a body that never contains the advertised boundary delimiter, or one whose header lines never contain \r\n\r\n — and force the server process to accumulate memory linearly with the bytes the protocol layer is willing to deliver. A handful of concurrent such uploads is sufficient to exhaust BEAM memory. This issue affects cowboy from 2.0.0 before 2.15.0.

Affected Products
Vendor
ninenines
Product
cowboy
Collection URL
https://repo.hex.pm
Package Name
cowboy
Repo
https://github.com/ninenines/cowboy
CPEs
  • cpe:2.3:a:ninenines:cowboy:*:*:*:*:*:*:*:*
Modules
  • cowboy_req
Program Files
  • src/cowboy_req.erl
Program Routines
  • cowboy_req:read_part/1
  • cowboy_req:read_part/2
  • cowboy_req:read_part/3
Default Status
unaffected
Versions
Affected
  • From 2.0.0 before 2.15.0 (semver)
Vendor
ninenines
Product
cowboy
Collection URL
https://github.com
Package Name
ninenines/cowboy
Repo
https://github.com/ninenines/cowboy
CPEs
  • cpe:2.3:a:ninenines:cowboy:*:*:*:*:*:*:*:*
Modules
  • cowboy_req
Program Files
  • src/cowboy_req.erl
Program Routines
  • cowboy_req:read_part/1
  • cowboy_req:read_part/2
  • cowboy_req:read_part/3
Default Status
unaffected
Versions
Affected
  • From 917cf99e10c41676183d501b86af6e47c95afb89 before 5c6a2061b41bb5771c4659fac7d5a822dca5bafb (git)
Problem Types
TypeCWE IDDescription
CWECWE-770CWE-770 Allocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: CWE-770
Description: CWE-770 Allocation of Resources Without Limits or Throttling
Metrics
VersionBase scoreBase severityVector
4.08.2HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-130CAPEC-130 Excessive Allocation
CAPEC ID: CAPEC-130
Description: CAPEC-130 Excessive Allocation
Solutions

Configurations

The application must expose an HTTP endpoint that calls cowboy_req:read_part/1,2 to process multipart/form-data request bodies. Deployments that do not handle multipart uploads are not affected.

Workarounds

Exploits

Credits

finder
Peter Ullrich
remediation developer
Loïc Hoguin
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cna.erlef.org/cves/CVE-2026-8466.html
related
third-party-advisory
https://osv.dev/vulnerability/EEF-CVE-2026-8466
related
https://github.com/ninenines/cowboy/commit/5c6a2061b41bb5771c4659fac7d5a822dca5bafb
patch
Hyperlink: https://cna.erlef.org/cves/CVE-2026-8466.html
Resource:
related
third-party-advisory
Hyperlink: https://osv.dev/vulnerability/EEF-CVE-2026-8466
Resource:
related
Hyperlink: https://github.com/ninenines/cowboy/commit/5c6a2061b41bb5771c4659fac7d5a822dca5bafb
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found