Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-73f9-jhhh-hr5m | Rails Active Storage has possible glob injection in its DiskService |
Tue, 24 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rubyonrails
Rubyonrails rails |
|
| CPEs | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rubyonrails
Rubyonrails rails |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails activestorage |
|
| Vendors & Products |
Rails
Rails activestorage |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#delete_prefixed` passes blob keys directly to `Dir.glob` without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharacters, it may be possible to delete unintended files from the storage directory. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. | |
| Title | Rails Active Storage has possible glob injection in its DiskService | |
| Weaknesses | CWE-74 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T15:44:19.018Z
Reserved: 2026-03-17T23:23:58.312Z
Link: CVE-2026-33202
Updated: 2026-03-24T15:44:10.144Z
Status : Analyzed
Published: 2026-03-24T00:16:29.157
Modified: 2026-03-24T17:55:12.260
Link: CVE-2026-33202
OpenCVE Enrichment
Updated: 2026-03-25T20:35:58Z
Github GHSA