Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.1

Hexpm API Key Can Be Used to Access Full Account Permissions

CVE-2026-21621 EEF-CVE-2026-21621 GHSA-739m-8727-j6w3
Summary

A security issue in Hexpm allows an attacker with a read-only API key to access full account permissions if they also have the account's 2FA code. This could allow them to make changes to the account, such as publishing, retiring, or modifying packages. To protect your account, review your API keys and ensure you're using the most restrictive permissions possible, and consider generating new keys with limited access.

Original title
Improper Scope Enforcement in OAuth client_credentials Flow Allows Read-Only API Key to Escalate to Full Access
Original description
Incorrect Authorization vulnerability in hexpm hexpm/hexpm ('Elixir.HexpmWeb.API.OAuthController' module) allows Privilege Escalation.

An API key created with read-only permissions (domain: "api", resource: "read") can be escalated to full write access under specific conditions.

When exchanging a read-only API key via the OAuth client_credentials grant, the resource qualifier is ignored. The resulting JWT receives the broad "api" scope instead of the expected "api:read" scope. This token is therefore treated as having full API access.

If an attacker is able to obtain a victim's read-only API key and a valid 2FA (TOTP) code for the victim account, they can use the incorrectly scoped JWT to create a new full-access API key with unrestricted API permissions that does not expire by default and can perform write operations such as publishing, retiring, or modifying packages.

This vulnerability is associated with program files lib/hexpm_web/controllers/api/oauth_controller.ex and program routines 'Elixir.HexpmWeb.API.OAuthController':validate_scopes_against_key/2.

This issue affects hexpm: from 71829cb6f6559bcceb1ef4e43a2fb8cdd3af654b before 71c127afebb7ed7cc637eb231b98feb802d62999.
nvd CVSS4.0 7.0
Vulnerability type
CWE-863 Incorrect Authorization
Published: 5 Mar 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026