CVE-2026-34763Permissive Regular Expression in Rack

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 88.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 17

Description

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

CVEListV5rack/rack< 2.2.23+2
RubyGemsrack/rack3.0.0.beta13.1.21+2

🔴Vulnerability Details

5
OSV
CVE-2026-34763: (Rack is a modular Ruby web server interface2026-04-03
CVEList
Rack: Rack::Directory info disclosure and DoS via unescaped regex interpolation2026-04-02
OSV
CVE-2026-34763: Rack is a modular Ruby web server interface2026-04-02
GHSA
Rack has a root directory disclosure via unescaped regex interpolation in Rack::Directory2026-04-02
OSV
Rack has a root directory disclosure via unescaped regex interpolation in Rack::Directory2026-04-02

📋Vendor Advisories

3
Ubuntu
Rack vulnerabilities2026-04-17
Red Hat
rack: Rack: Information disclosure via regular expression metacharacters in root path2026-04-02
Debian
CVE-2026-34763: ruby-rack - Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-34763 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-34763 — Permissive Regular Expression in Rack | cvebase