<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Plug — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/plug/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 15:36:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/plug/feed.xml" rel="self" type="application/rss+xml"/><item><title>Plug Multipart Header Parsing Denial-of-Service Vulnerability (CVE-2026-8468)</title><link>https://feed.craftedsignal.io/briefs/2026-05-plug-multipart-dos/</link><pubDate>Wed, 20 May 2026 15:36:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-plug-multipart-dos/</guid><description>Plug versions 1.4.0 to 1.19.1 are vulnerable to denial-of-service (CVE-2026-8468) due to unbounded buffer accumulation in multipart header parsing, allowing an unauthenticated attacker to exhaust server memory by sending a crafted multipart/form-data request.</description><content:encoded><![CDATA[<p>Plug, a popular web application library for Elixir, is susceptible to a denial-of-service vulnerability (CVE-2026-8468) within its multipart header parsing functionality. The vulnerability resides in the <code>Plug.Conn.read_part_headers/2</code> function, which fails to enforce limits on the size of the accumulated buffer when parsing multipart/form-data requests. This flaw allows an unauthenticated attacker to send specially crafted HTTP requests containing excessively large multipart headers, leading to uncontrolled memory allocation on the server. By repeatedly sending such requests, an attacker can exhaust available memory resources, ultimately causing the server to crash or become unresponsive, resulting in a denial of service. Specifically, versions &gt;= 1.4.0, &lt; 1.15.4, versions &gt;= 1.16.0, &lt; 1.16.3, versions &gt;= 1.17.0, &lt; 1.17.1, versions &gt;= 1.18.0, &lt; 1.18.2 and versions &gt;= 1.19.0, &lt; 1.19.2 are affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Plug-based web application that utilizes <code>Plug.Parsers</code> with the <code>:multipart</code> parser or calls <code>Plug.Conn.read_part_headers/2</code> directly.</li>
<li>The attacker crafts a malicious HTTP request with the <code>Content-Type</code> header set to <code>multipart/form-data</code>.</li>
<li>Within the multipart data, the attacker constructs a part header with an excessively large size, exceeding expected limits. The attacker omits a closing boundary to continue the uncontrolled header accumulation.</li>
<li>The attacker sends the crafted HTTP request to the vulnerable endpoint of the Plug application.</li>
<li>The <code>Plug.Conn.read_part_headers/2</code> function processes the request and begins accumulating the multipart header data without proper length validation.</li>
<li>The function continuously allocates memory to store the expanding header buffer, consuming available server resources.</li>
<li>The attacker repeats the process by sending multiple malicious requests, accelerating memory exhaustion.</li>
<li>Eventually, the server runs out of memory, causing the Plug application to crash or become unresponsive, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition, rendering the affected Plug-based web application unavailable to legitimate users. The impact could range from temporary service disruptions to prolonged outages, depending on the severity of the memory exhaustion and the system&rsquo;s recovery capabilities. The number of victims depends on the popularity and criticality of the affected applications. There is no evidence of widespread exploitation at this time.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Plug version 1.15.4, 1.16.3, 1.17.1, 1.18.2, 1.19.2, or later, which includes the patch for CVE-2026-8468 (see References).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Multipart Form Request</code> to identify and block requests with abnormally large multipart headers.</li>
<li>Monitor web server logs for a high volume of <code>multipart/form-data</code> requests with unusually large header sizes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>multipart</category><category>web-application</category></item></channel></rss>