Description
# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: ["select", "style"] %>```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).
Published: 2022-06-24
Score: 6.1 Medium
EPSS: 5.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3227-1 ruby-rails-html-sanitizer security update
Debian DLA Debian DLA DLA-3566-1 ruby-rails-html-sanitizer security update
Debian DLA Debian DLA DLA-3902-1 ruby-rails-html-sanitizer security update
Github GHSA Github GHSA GHSA-pg8v-g4xq-hww9 Rails::Html::Sanitizer vulnerable to Cross-site Scripting
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.04125}

epss

{'score': 0.04955}


Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Redhat Satellite
Rubyonrails Rails Html Sanitizers
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-11-03T21:46:21.461Z

Reserved: 2022-06-01T00:00:00.000Z

Link: CVE-2022-32209

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:11.153

Modified: 2025-11-03T22:15:58.770

Link: CVE-2022-32209

cve-icon Redhat

Severity : Important

Publid Date: 2022-06-24T00:00:00Z

Links: CVE-2022-32209 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses