-
Notifications
You must be signed in to change notification settings - Fork 924
Description
CVE-2026-33168 - Medium Severity Vulnerability
Vulnerable Library - actionview-8.0.4.gem
Simple, battle-tested conventions and helpers for building web pages.
Library home page: https://rubygems.org/gems/actionview-8.0.4.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /tmp/containerbase/cache/.ruby/cache/actionview-8.0.4.gem
Dependency Hierarchy:
- gettext_i18n_rails_js-1.3.1.gem (Root Library)
- rails-8.0.4.gem
- ❌ actionview-8.0.4.gem (Vulnerable Library)
- rails-8.0.4.gem
Found in base branch: master
Vulnerability Details
Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Publish Date: 2026-03-23
URL: CVE-2026-33168
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-23
Fix Resolution: https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.1.2.1
Step up your Open Source Security Game with Mend here