PT-2026-42177 · Unknown · Phoenix Storybook
Christian Blavier
+2
·
Published
2026-05-20
·
Updated
2026-05-20
·
CVE-2026-47068
CVSS v4.0
2.3
Low
| Vector | AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
phoenix storybook versions 0.4.0 through 1.0.x
Description
An authorization bypass occurs due to user-controlled keys, allowing cross-session PubSub topic injection via a URL query parameter. The function
handle params/3 in Elixir.PhoenixStorybook.Story.ComponentIframeLive reads a PubSub topic directly from the topic parameter and broadcasts the iframe process pid without verifying if the topic belongs to the requesting session. This allows an attacker to load the endpoint '/storybook/iframe/' with a topic parameter belonging to a victim, causing the victim's playground to send private control messages, such as variation state and theme switches, to the attacker's iframe process.Recommendations
Update phoenix storybook to version 1.1.0.
Fix
IDOR
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Phoenix Storybook