Vulnerability Description
ewe is a Gleam web server. Versions 0.8.0 through 3.0.4 contain a bug in the handle_trailers function where rejected trailer headers (forbidden or undeclared) cause an infinite loop. When handle_trailers encounters such a trailer, three code paths (lines 520, 523, 526) recurse with the original buffer (rest) instead of advancing past the rejected header (Buffer(header_rest, 0)), causing decoder.decode_packet to re-parse the same header on every iteration. The resulting loop has no timeout or escape — the BEAM process permanently wedges at 100% CPU. Any application that calls ewe.read_body on chunked requests is affected, and this is exploitable by any unauthenticated remote client before control returns to application code, making an application-level workaround impossible. This issue is fixed in version 3.0.5.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vshakitskiy | Ewe | >= 0.8.0, < 3.0.5 |
Related Weaknesses (CWE)
References
- https://github.com/vshakitskiy/ewe/commit/8513de9dcdd0005f727c0f6f15dd89f8d626f5Patch
- https://github.com/vshakitskiy/ewe/commit/d8b9b8a86470c0cb5696647997c2f34763506ePatch
- https://github.com/vshakitskiy/ewe/security/advisories/GHSA-4w98-xf39-23gpExploitPatchVendor Advisory
- https://github.com/vshakitskiy/ewe/security/advisories/GHSA-4w98-xf39-23gpExploitPatchVendor Advisory
FAQ
What is CVE-2026-32873?
CVE-2026-32873 is a vulnerability with a CVSS score of 7.5 (HIGH). ewe is a Gleam web server. Versions 0.8.0 through 3.0.4 contain a bug in the handle_trailers function where rejected trailer headers (forbidden or undeclared) cause an infinite loop. When handle_trail...
How severe is CVE-2026-32873?
CVE-2026-32873 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32873?
Check the references section above for vendor advisories and patch information. Affected products include: Vshakitskiy Ewe.