Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4w98-xf39-23gp | Loop with Unreachable Exit Condition ('Infinite Loop') in ewe |
Thu, 16 Apr 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-835 | |
| CPEs | cpe:2.3:a:vshakitskiy:ewe:*:*:*:*:*:*:*:* |
Fri, 20 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vshakitskiy
Vshakitskiy ewe |
|
| Vendors & Products |
Vshakitskiy
Vshakitskiy ewe |
Fri, 20 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ewe is a Gleam web server. Versions 0.8.0 through 3.0.4 contain a bug in the handle_trailers function where rejected trailer headers (forbidden or undeclared) cause an infinite loop. When handle_trailers encounters such a trailer, three code paths (lines 520, 523, 526) recurse with the original buffer (rest) instead of advancing past the rejected header (Buffer(header_rest, 0)), causing decoder.decode_packet to re-parse the same header on every iteration. The resulting loop has no timeout or escape — the BEAM process permanently wedges at 100% CPU. Any application that calls ewe.read_body on chunked requests is affected, and this is exploitable by any unauthenticated remote client before control returns to application code, making an application-level workaround impossible. This issue is fixed in version 3.0.5. | |
| Title | ewe: Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Weaknesses | CWE-825 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T18:08:59.660Z
Reserved: 2026-03-16T21:03:44.419Z
Link: CVE-2026-32873
Updated: 2026-03-20T16:56:32.878Z
Status : Analyzed
Published: 2026-03-20T02:16:35.540
Modified: 2026-04-16T13:27:24.807
Link: CVE-2026-32873
No data.
OpenCVE Enrichment
Updated: 2026-04-17T11:30:17Z
Github GHSA