CVE-2026-33872
March 27, 2026
elixir-nodejs provides an Elixir API for calling Node.js functions. A vulnerability in versions prior to 3.1.4 results in Cross-User Data Leakage or Information Disclosure due to a race condition in the worker protocol. The lack of request-response correlation creates a "stale response" vulnerability. Because the worker does not verify which request a response belongs to, it may return the next available data in the buffer to an unrelated caller. In high-throughput environments where the library processes sensitive user data (e.g., PII, authentication tokens, or private records), a timeout or high concurrent load can cause Data A (belonging to User A) to be returned to User B. This may lead to unauthorized information disclosure that is difficult to trace, as the application may not throw an error but instead provide "valid-looking" yet entirely incorrect and private data to the wrong session. The issue is fixed in v3.1.4.
Affected Packages
https://github.com/revelrylabs/elixir-nodejs.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.1.4Fix Suggestion:
Update to version v3.1.4https://github.com/revelrylabs/elixir-nodejs.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.1.4Fix Suggestion:
Update to version v3.1.4https://github.com/revelrylabs/elixir-nodejs.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.1.4Fix Suggestion:
Update to version v3.1.4https://github.com/revelrylabs/elixir-nodejs.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.1.4Fix Suggestion:
Update to version v3.1.4https://github.com/revelrylabs/elixir-nodejs.git (GITHUB):
Affected version(s) >=v3.0.0 <v3.1.4Fix Suggestion:
Update to version v3.1.4nodejs (HEX):
Affected version(s) >=0.1.0 <3.1.4Fix Suggestion:
Update to version 3.1.4nodejs (HEX):
Affected version(s) >=0.1.0 <3.1.4Fix Suggestion:
Update to version 3.1.4nodejs (HEX):
Affected version(s) >=0.1.0 <3.1.4Fix Suggestion:
Update to version 3.1.4nodejs (HEX):
Affected version(s) >=0.1.0 <3.1.4Fix Suggestion:
Update to version 3.1.4nodejs (HEX):
Affected version(s) >=0.1.0 <3.1.4Fix Suggestion:
Update to version 3.1.4Related ResourcesĀ (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
EPSS
Base Score:
0.08