Rubyonrails Rails vulnerabilities

138 known vulnerabilities affecting rubyonrails/rails.

Total CVEs
138
CISA KEV
3
actively exploited
Public exploits
12
Exploited in wild
2
Severity breakdown
CRITICAL8HIGH38MEDIUM89LOW3

Vulnerabilities

Page 1 of 7
CVE-2026-33195HIGHCVSS 8.0fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33195 [HIGH] CWE-22 CVE-2026-33195: Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#path_for` does not validate that the resolved filesystem path remains within the storage root directory. If a blob key containing path traversal sequences (e.g. `../`) is used, it could allow
nvd
CVE-2026-33176MEDIUMCVSS 6.6fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33176 [MEDIUM] CWE-400 CVE-2026-33176: Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails f Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Support number helpers accept strings containing scientific notation (e.g. `1e10000`), which `BigDecimal` expands into extremely large decimal representations. This can cause excessive
nvd
CVE-2026-33170MEDIUMCVSS 5.3fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33170 [MEDIUM] CWE-79 CVE-2026-33170: Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails f Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `SafeBuffer#%` does not propagate the `@html_unsafe` flag to the newly created buffer. If a `SafeBuffer` is mutated in place (e.g. via `gsub!`) and then formatted with `%` using untrusted argum
nvd
CVE-2026-33169MEDIUMCVSS 6.9fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33169 [MEDIUM] CWE-400 CVE-2026-33169: Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails f Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. `NumberToDelimitedConverter` uses a lookahead-based regular expression with `gsub!` to insert thousands delimiters. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, the interaction between the repeated lookahead group and `gsub!` can produce
nvd
CVE-2026-33173MEDIUMCVSS 5.3fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33173 [MEDIUM] CWE-925 CVE-2026-33173: Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `DirectUploadsController` accepts arbitrary metadata from the client and persists it on the blob. Because internal flags like `identified` and `analyzed` are stored in the same metadata hash, a direct-upload client can
nvd
CVE-2026-33202MEDIUMCVSS 6.6fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33202 [MEDIUM] CWE-74 CVE-2026-33202: Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#delete_prefixed` passes blob keys directly to `Dir.glob` without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharact
nvd
CVE-2026-33174MEDIUMCVSS 6.6fixed in 7.2.3.1≥ 8.0.0, < 8.0.4.1+1 more2026-03-24
CVE-2026-33174 [MEDIUM] CWE-789 CVE-2026-33174: Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when serving files through Active Storage's proxy delivery mode, the proxy controller loads the entire requested byte range into memory before sending it. A request with a large or unbounded Range header (e.g. `bytes=0-
nvd
CVE-2025-24293CRITICALCVSS 9.2≥ 0, < 2:6.0.3.7+dfsg-2+deb11u4≥ 0, < 2:6.1.7.10+dfsg-1~deb12u2+2 more2026-01-30
CVE-2025-24293 [CRITICAL] CVE-2025-24293: # Active Storage allowed transformation methods potentially unsafe Active Storage attempts to prevent the use of potentially unsafe image transformati # Active Storage allowed transformation methods potentially unsafe Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default. The default allowed list contains three methods allow for the circumvention of the safe defaults which enables potentia
osv
CVE-2025-55193LOWCVSS 2.7≥ 0, < 2:6.0.3.7+dfsg-2+deb11u4≥ 0, < 2:6.1.7.10+dfsg-1~deb12u2+2 more2025-08-13
CVE-2025-55193 [LOW] CVE-2025-55193: Active Record connects classes to relational database tables Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences. This issue has been patched in versions 7.1.5.2, 7.2.2.2, and 8.0.2.1.
osv
CVE-2023-23913MEDIUMCVSS 6.3≥ 0, < 2:6.0.3.7+dfsg-2+deb11u2≥ 0, < 2:6.1.7.3+dfsg-12025-01-09
CVE-2023-23913 [MEDIUM] CVE-2023-23913: There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or
osv
CVE-2023-38037MEDIUMCVSS 5.5≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2025-01-09
CVE-2023-38037 [MEDIUM] CVE-2023-38037: ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this tem
osv
CVE-2023-28120MEDIUMCVSS 5.3≥ 0, < 2:6.0.3.7+dfsg-2+deb11u2≥ 0, < 2:6.1.7.3+dfsg-12025-01-09
CVE-2023-28120 [MEDIUM] CVE-2023-28120: There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
osv
CVE-2023-28362MEDIUMCVSS 4.0≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2025-01-09
CVE-2023-28362 [MEDIUM] CVE-2023-28362: The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
osv
CVE-2024-54133LOWCVSS 2.3≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2024-12-10
CVE-2024-54133 [LOW] CVE-2024-54133: Action Pack is a framework for handling and responding to web requests Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable
osv
CVE-2024-47889MEDIUMCVSS 6.6≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2024-10-16
CVE-2024-47889 [MEDIUM] CVE-2024-47889: Action Mailer is a framework for designing email service layers Action Mailer is a framework for designing email service layers. Starting in version 3.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the block_format helper in Action Mailer. Carefully crafted text can cause the block_format helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an
osv
CVE-2024-47888MEDIUMCVSS 6.6≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2024-10-16
CVE-2024-47888 [MEDIUM] CVE-2024-47888: Action Text brings rich text content and editing to Rails Action Text brings rich text content and editing to Rails. Starting in version 6.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the `plain_text_for_blockquote_node helper` in Action Text. Carefully crafted text can cause the `plain_text_for_blockquote_node` helper to take an unexpected amount of time, possibly resulting in a DoS vulnerabi
osv
CVE-2024-47887MEDIUMCVSS 6.6≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2024-10-16
CVE-2024-47887 [MEDIUM] CVE-2024-47887: Action Pack is a framework for handling and responding to web requests Action Pack is a framework for handling and responding to web requests. Starting in version 4.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may c
osv
CVE-2024-41128MEDIUMCVSS 6.6≥ 0, < 2:6.0.3.7+dfsg-2+deb11u3≥ 0, < 2:6.1.7.10+dfsg-1~deb12u1+1 more2024-10-16
CVE-2024-41128 [MEDIUM] CVE-2024-41128: Action Pack is a framework for handling and responding to web requests Action Pack is a framework for handling and responding to web requests. Starting in version 3.1.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting
osv
CVE-2024-28103CRITICALCVSS 9.8≥ 6.1.0, < 6.1.7.8≥ 7.0.0, < 7.0.8.4+2 more2024-06-04
CVE-2024-28103 [CRITICAL] CWE-20 CVE-2024-28103: Action Pack is a framework for handling and responding to web requests. Since 6.1.0, the application Action Pack is a framework for handling and responding to web requests. Since 6.1.0, the application configurable Permissions-Policy is only served on responses with an HTML related Content-Type. This vulnerability is fixed in 6.1.7.8, 7.0.8.2, and 7.1.3.3.
nvdosv
CVE-2024-32464MEDIUMCVSS 6.1≥ 7.1.0, < 7.1.3.4v7.2.02024-06-04
CVE-2024-32464 [MEDIUM] CWE-79 CVE-2024-32464: Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::Cont Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.
nvd