Current section
4 Advisories
Jump to
Current section
4 Advisories
wisp has Allocation of Resources Without Limits or Throttling
Affected Versions
References
- https://cna.erlef.org/cves/CVE-2026-32145.html
- https://github.com/gleam-wisp/wisp/security/advisories/GHSA-8645-p2v4-73r2
- https://nvd.nist.gov/vuln/detail/CVE-2026-32145
- https://github.com/gleam-wisp/wisp/commit/7a978748e12ab29db232c222254465890e1a4a90
- https://github.com/gleam-wisp/wisp
- https://osv.dev/vulnerability/EEF-CVE-2026-32145
Multipart form body parser bypasses body size limits in wisp
Affected Versions
Wisp Vulnerable to Path Traversal
Affected Versions
References
- https://github.com/gleam-wisp/wisp/security/advisories/GHSA-h7cj-j2vv-qw8r
- https://osv.dev/vulnerability/EEF-CVE-2026-28807
- https://github.com/gleam-wisp/wisp
- https://cna.erlef.org/cves/CVE-2026-28807.html
- https://github.com/gleam-wisp/wisp/commit/161118c431047f7ef1ff7cabfcc38981877fdd93
- https://github.com/gleam-wisp/wisp/commit/129dcb1fe10ab1e676145d91477535e1c90ab550
- https://nvd.nist.gov/vuln/detail/CVE-2026-28807
Path Traversal in wisp.serve_static allows arbitrary file read
Affected Versions
Checksum
Dependency Config
mix.exs
rebar.config
Gleam
erlang.mk
Package Details
this version
10 589
yesterday
370
last 7 days
2 522
all time
229 934