-
-
Notifications
You must be signed in to change notification settings - Fork 231
Expand file tree
/
Copy pathCVE-2026-33168.yml
More file actions
31 lines (30 loc) · 1.35 KB
/
CVE-2026-33168.yml
File metadata and controls
31 lines (30 loc) · 1.35 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
---
gem: actionview
framework: rails
cve: 2026-33168
ghsa: v55j-83pf-r9cq
url: https://github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq
title: Rails has a possible XSS vulnerability in its Action View tag helpers
date: 2026-03-23
description: |
### Impact
When a blank string is used as an HTML attribute name in Action View tag helpers,
the attribute escaping is bypassed, producing malformed HTML.
A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name,
possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected.
### Releases
The fixed releases are available at the normal locations.
patched_versions:
- "~> 7.2.3, >= 7.2.3.1"
- "~> 8.0.4, >= 8.0.4.1"
- ">= 8.1.2.1"
related:
url:
- https://github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq
- https://github.com/rails/rails/commit/0b6f8002b52b9c606fd6be9e7915d9f944cf539c
- https://github.com/rails/rails/commit/63f5ad83edaa0b976f82d46988d745426aa4a42d
- https://github.com/rails/rails/commit/c79a07df1e88738df8f68cb0ee759ad6128ca924
- https://github.com/rails/rails/releases/tag/v7.2.3.1
- https://github.com/rails/rails/releases/tag/v8.0.4.1
- https://github.com/rails/rails/releases/tag/v8.1.2.1
- https://github.com/advisories/GHSA-v55j-83pf-r9cq