Insufficient Session Expiration in HexPM Affects User Account Security
CVE-2026-21622
What is CVE-2026-21622?
In HexPM's password reset mechanism, the tokens generated for resetting passwords do not expire, creating a significant security risk. Attackers can exploit this vulnerability if they gain access to historical emails that contained password reset tokens. Since these tokens are valid indefinitely, they can be used to reset a victim's password—even without current access to the victim's email account. The absence of time-based expiration for the password reset links exposes users to potential account takeovers, particularly if their past correspondence is compromised. Addressing this issue is crucial for maintaining the integrity of user accounts.
Affected Version(s)
hex.pm 2025-08-01 < 2026-03-05
hexpm 617e44c71f1dd9043870205f371d375c5c4d886d
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
