Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pgm4-439c-5jp6 | Rails has a possible XSS vulnerability in its Action Pack debug exceptions |
Tue, 24 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rubyonrails
Rubyonrails actionpack |
|
| Vendors & Products |
Rubyonrails
Rubyonrails actionpack |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Action Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (`config.consider_all_requests_local = true`), which is the default in development. Version 8.1.2.1 contains a patch. | |
| Title | Rails has a possible XSS vulnerability in its Action Pack debug exceptions | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T18:44:13.020Z
Reserved: 2026-03-17T21:17:08.888Z
Link: CVE-2026-33167
Updated: 2026-03-24T18:44:09.646Z
Status : Awaiting Analysis
Published: 2026-03-23T23:17:12.707
Modified: 2026-03-24T15:53:48.067
Link: CVE-2026-33167
OpenCVE Enrichment
Updated: 2026-03-25T20:36:10Z
Github GHSA