PT-2026-42177 · Unknown · Phoenix Storybook

Christian Blavier

+2

·

Published

2026-05-20

·

Updated

2026-05-20

·

CVE-2026-47068

CVSS v4.0

2.3

Low

VectorAV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions phoenix storybook versions 0.4.0 through 1.0.x
Description An authorization bypass occurs due to user-controlled keys, allowing cross-session PubSub topic injection via a URL query parameter. The function handle params/3 in Elixir.PhoenixStorybook.Story.ComponentIframeLive reads a PubSub topic directly from the topic parameter and broadcasts the iframe process pid without verifying if the topic belongs to the requesting session. This allows an attacker to load the endpoint '/storybook/iframe/' with a topic parameter belonging to a victim, causing the victim's playground to send private control messages, such as variation state and theme switches, to the attacker's iframe process.
Recommendations Update phoenix storybook to version 1.1.0.

Fix

IDOR

Weakness Enumeration

Related Identifiers

CVE-2026-47068
GHSA-MRHX-6PW9-Q5FH

Affected Products

Phoenix Storybook