Rails Actionview vulnerabilities
13 known vulnerabilities affecting rails/actionview.
Total CVEs
13
CISA KEV
2
actively exploited
Public exploits
3
Exploited in wild
1
Severity breakdown
HIGH5MEDIUM7LOW1
Vulnerabilities
Page 1 of 1
CVE-2026-33168LOWCVSS 2.3v>= 8.1.0.beta1, < 8.1.2.1v>= 8.0.0.beta1, < 8.0.4.1+1 more2026-03-23
CVE-2026-33168 [LOW] CWE-79 CVE-2026-33168: Action View provides conventions and helpers for building web pages with the Rails framework. Prior
Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by t
cvelistv5ghsanvdosv
CVE-2023-23913MEDIUMCVSS 6.3≥ 5.1.0, < 6.1.7.3≥ 7.0.0, < 7.0.4.32023-06-09
CVE-2023-23913 [MEDIUM] CWE-79 rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements
rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements
NOTE: rails-ujs is part of Rails/actionview since 5.1.0.
There is a potential DOM based cross-site scripting issue in rails-ujs
which leverages the Clipboard API to target HTML elements that are
assigned the contenteditable attribute. This has the potential to
occur when pasting malicious HTML co
ghsaosv
CVE-2022-27777MEDIUMCVSS 6.1≥ 0, < 5.2.7.1≥ 6.0.0, < 6.0.4.8+2 more2022-04-27
CVE-2022-27777 [MEDIUM] CWE-79 XSS Vulnerability in Action View tag helpers
XSS Vulnerability in Action View tag helpers
There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777.
Versions Affected: ALL
Not affected: NONE
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
If untrusted data is passed as the hash key for tag att
ghsaosv
CVE-2020-15169MEDIUMCVSS 6.1fixed in 5.2.4.4v>= 6.0.0.0, < 6.0.3.32020-09-11
CVE-2020-15169 [MEDIUM] CWE-79 CVE-2020-15169: In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) v
In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a miss
cvelistv5ghsanvdosv
CVE-2020-8163HIGHPoC≥ 0, < 4.2.11.32020-07-07
CVE-2020-8163 [HIGH] CWE-94 Remote code execution via user-provided local names in ActionView
Remote code execution via user-provided local names in ActionView
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that would allow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
ghsaosv
CVE-2020-8167MEDIUMCVSS 5.0≥ 5.0.0, < 5.2.4.3≥ 6.0.0, < 6.0.3.12020-07-07
CVE-2020-8167 [MEDIUM] CWE-352 CSRF Vulnerability in rails-ujs
CSRF Vulnerability in rails-ujs
There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains.
Versions Affected: rails = 5.2.4.3, rails >= 6.0.3.1
Impact
This is a regression of CVE-2015-1840.
In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or acti
ghsaosv
CVE-2020-5267MEDIUMCVSS 4.8fixed in 5.2.4.2v>= 6.0.0, < 6.0.2.22020-03-19
CVE-2020-5267 [MEDIUM] CWE-80 CVE-2020-5267: In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionVi
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
cvelistv5ghsanvdosv
CVE-2019-5419HIGH≥ 4.0.0, < 4.2.11.1≥ 5.2.0, < 5.2.2.1+3 more2019-03-13
CVE-2019-5419 [HIGH] CWE-400 Denial of Service Vulnerability in Action View
Denial of Service Vulnerability in Action View
# Denial of Service Vulnerability in Action View
Impact
Specially crafted accept headers can cause the Action View template location code to consume 100% CPU, causing the server unable to process requests. This impacts all Rails applications that render views.
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
ghsaosv
CVE-2019-5418HIGHKEVPoC≥ 5.2.0, < 5.2.2.1≥ 4.0.0, < 4.2.11.1+2 more2019-03-13
CVE-2019-5418 [HIGH] CWE-22 Path Traversal in Action View
Path Traversal in Action View
# File Content Disclosure in Action View
Impact
There is a possible file content disclosure vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents.
The impact is limited to calls to `render` which render file contents without a specified accept format. Impacted cod
ghsaosv
CVE-2016-0752HIGHCVSS 7.5KEVPoC≥ 3.2.0, < 3.2.22.2≥ 4.0.0, < 4.1.14.22018-08-13
CVE-2016-0752 [HIGH] Moderate severity vulnerability that affects actionview
Moderate severity vulnerability that affects actionview
Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete
ghsaosv
CVE-2016-2097HIGHCVSS 7.5≥ 3.0.0, < 3.2.22.2≥ 4.0.0, < 4.1.14.22017-10-24
CVE-2016-2097 [HIGH] CWE-22 actionview contains Path Traversal vulnerability
actionview contains Path Traversal vulnerability
There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all possible scenarios. This vulnerability has been assigned the CVE identifier CVE-2016-2097.
Versions Affected: 3.2.x, 4.0.x, 4.1.x
Not affected: 4.2+
Fixed Versions: 3.2.22.2, 4.1.14.2
Impact
A
ghsaosv
CVE-2011-0446MEDIUM≥ 0, < 2.3.11≥ 3.0.0, < 3.0.42017-10-24
CVE-2011-0446 [MEDIUM] CWE-79 Rails actionpack gem vulnerable to Cross-site Scripting
Rails actionpack gem vulnerable to Cross-site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in the `mail_to` helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.
ghsaosv
CVE-2016-6316MEDIUM≥ 3.0.0, < 3.2.22.3≥ 4.0.0, < 4.2.7.1+1 more2017-10-24
CVE-2016-6316 [MEDIUM] CWE-79 actionview Cross-site Scripting vulnerability
actionview Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
ghsaosv