Erlang Otp vulnerabilities
17 known vulnerabilities affecting erlang/otp.
Total CVEs
17
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH6MEDIUM8LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-32144HIGHCVSS 7.6≥ 1.16, < *≥ 11.2, < *+2 more2026-04-07
CVE-2026-32144 [HIGH] CWE-295 CVE-2026-32144: Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows O
Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification.
The OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA.
cvelistv5nvd
CVE-2026-28808HIGHCVSS 8.3≥ 5.10, < *≥ 17.0, < *+1 more2026-04-07
CVE-2026-28808 [HIGH] CWE-863 CVE-2026-28808: Incorrect Authorization vulnerability in Erlang OTP (inets modules) allows unauthenticated access to
Incorrect Authorization vulnerability in Erlang OTP (inets modules) allows unauthenticated access to CGI scripts protected by directory rules when served via script_alias.
When script_alias maps a URL prefix to a directory outside DocumentRoot, mod_auth evaluates directory-based access controls against the DocumentRoot-relative path while mod_cgi exe
cvelistv5nvd
CVE-2026-28810MEDIUMCVSS 6.3≥ 3.0, < *≥ 17.0, < *+1 more2026-04-07
CVE-2026-28810 [MEDIUM] CWE-340 CVE-2026-28810: Generation of Predictable Numbers or Identifiers vulnerability in Erlang/OTP kernel (inet_res, inet_
Generation of Predictable Numbers or Identifiers vulnerability in Erlang/OTP kernel (inet_res, inet_db modules) allows DNS Cache Poisoning.
The built-in DNS resolver (inet_res) uses a sequential, process-global 16-bit transaction ID for UDP queries and does not implement source port randomization. Response validation relies almost entirely on this
cvelistv5nvd
CVE-2026-23941HIGHCVSS 7.0≥ 5.10, < *≥ 17.0, < *+1 more2026-03-13
CVE-2026-23941 [HIGH] CWE-444 CVE-2026-23941: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.
This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.
The server does not reject or normalize duplicate Co
cvelistv5nvd
CVE-2026-23942MEDIUMCVSS 5.3≥ 3.0.1, < *≥ 17.0, < *+1 more2026-03-13
CVE-2026-23942 [MEDIUM] CWE-22 CVE-2026-23942: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erla
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal.
This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2.
The SFTP server uses string prefix matching via lists:prefix/2 rather than
cvelistv5nvd
CVE-2026-23943MEDIUMCVSS 6.9≥ 3.0.1, < *≥ 17.0, < *+1 more2026-03-13
CVE-2026-23943 [MEDIUM] CWE-409 CVE-2026-23943: Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_
Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion.
The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory ex
cvelistv5nvd
CVE-2026-21620LOWCVSS 2.3≥ 17.0, < *≥ 07b8f441ca711f9812fad9e9115bab3c3aa92f79, < *+2 more2026-02-20
CVE-2026-21620 [LOW] CWE-23 CVE-2026-21620: Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erla
Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl.
This issue affects ot
cvelistv5nvd
CVE-2025-48041HIGHCVSS 7.1≥ 3.0.1, < *≥ 17.0, < *+1 more2025-09-11
CVE-2025-48041 [HIGH] CWE-400 CVE-2025-48041: Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modul
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.
This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2
cvelistv5nvd
CVE-2025-48040MEDIUMCVSS 6.9≥ 3.0.1, < *≥ 17.0, < *+1 more2025-09-11
CVE-2025-48040 [MEDIUM] CWE-400 CVE-2025-48040: Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessiv
Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.
This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.1
cvelistv5nvd
CVE-2025-48038MEDIUMCVSS 5.3≥ 3.0.1, < *≥ 17.0, < *+1 more2025-09-11
CVE-2025-48038 [MEDIUM] CWE-400 CVE-2025-48038: Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modul
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.
This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1
cvelistv5nvd
CVE-2025-48039MEDIUMCVSS 5.3≥ 3.0.1, < *≥ 17.0, < *+1 more2025-09-11
CVE-2025-48039 [MEDIUM] CWE-400 CVE-2025-48039: Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modul
Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.
This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1
cvelistv5nvd
CVE-2025-4748MEDIUMCVSS 4.8≥ 2.0, < *≥ 17.0, < *+1 more2025-06-16
CVE-2025-4748 [MEDIUM] CWE-22 CVE-2025-4748: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erla
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is
cvelistv5nvd
CVE-2025-46712LOWCVSS 3.7v>= OTP 27.0, < OTP 27.3.4v>= OTP 26.2.1, < OTP 26.2.5.12+1 more2025-05-08
CVE-2025-46712 [LOW] CWE-440 CVE-2025-46712: Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.
Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these me
cvelistv5nvd
CVE-2025-32433CRITICALCVSS 10.0KEVPoCv>= OTP-27.0-rc1, < OTP-27.3.3v>= OTP-26.0-rc1, < OTP-26.2.5.11+1 more2025-04-16
CVE-2025-32433 [CRITICAL] CWE-306 CVE-2025-32433: Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3,
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems a
cvelistv5nvd
CVE-2025-30211HIGHCVSS 7.5fixed in OTP-27.3.1fixed in OTP-26.2.5.10+1 more2025-03-28
CVE-2025-30211 [HIGH] CWE-789 CVE-2025-30211: Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1,
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to ineffi
cvelistv5nvd
CVE-2025-26618HIGHCVSS 7.0v>= OTP-27.0.0, < OTP-27.2.4v>= OTP-26.0.0.0, < OTP-26.2.5.9+1 more2025-02-20
CVE-2025-26618 [HIGH] CWE-789 CVE-2025-26618: Erlang is a programming language and runtime system for building massively scalable soft real-time s
Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a resul
cvelistv5nvd
CVE-2024-53846MEDIUMCVSS 5.5v>= 25.3.2.8, <= 25.3.2.16v>= 26.2, <= 26.2.5.6+1 more2024-12-05
CVE-2024-53846 [MEDIUM] CWE-295 CVE-2024-53846: OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-
OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang, and a set of design principles for Erlang programs. A regression was introduced into the ssl application of OTP starting at OTP-25.3.2.8, OTP-26.2, and OTP-27.0, resulting in a server or client verifying the pe
cvelistv5nvd