Home hexpm CVE-2026-21622
Back to hexpm

CVE-2026-21622

hexpm - Elixir.Hexpm.Accounts.PasswordReset

hexpm CVSS 9.8 Updated April 6, 2026

Executive Risk Summary

"The hexpm/hexpm 'Elixir.Hexpm.Accounts.PasswordReset' module has an insufficient session expiration vulnerability, allowing account takeover. This occurs because password reset tokens do not expire, enabling an attacker to use a previously leaked reset email to reset a victim's password."

Anticipated Attack Path

  1. 1. Obtain a previously leaked password reset email
  2. 2. Use the password reset token to reset the victim's password
  3. 3. Gain unauthorized access to the victim's account

Am I Vulnerable?

  • Verify if hexpm version is before bb0e42091995945deef10556f58d046a52eb7884
  • Check for any leaked password reset emails in email archives
  • Implement additional security measures, such as two-factor authentication

Operational Audit Arsenal

Target Type Elixir module
Target Asset Elixir.Hexpm.Accounts.PasswordReset
Standard Path lib/hexpm/accounts/password_reset.ex

Manual Verification Required

This is a non-Windows asset (hexpm). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only affects the password reset functionality

Internal Work Notes

Account takeover vulnerability in hexpm/hexpm 'Elixir.Hexpm.Accounts.PasswordReset' module due to insufficient session expiration, requiring immediate patching and additional security measures.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.