Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pv9c-9mfh-hvxq | iCalendar has ICS injection via unsanitized URI property values |
Fri, 10 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Icalendar Project
Icalendar Project icalendar |
|
| CPEs | cpe:2.3:a:icalendar_project:icalendar:*:*:*:*:*:ruby:*:* | |
| Vendors & Products |
Icalendar Project
Icalendar Project icalendar |
Mon, 30 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Icalendar
Icalendar icalendar |
|
| Vendors & Products |
Icalendar
Icalendar icalendar |
Thu, 26 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | iCalendar is a Ruby library for dealing with iCalendar files in the iCalendar format defined by RFC-5545. Starting in version 2.0.0 and prior to version 2.12.2, .ics serialization does not properly sanitize URI property values, enabling ICS injection through attacker-controlled input, adding arbitrary calendar lines to the output. `Icalendar::Values::Uri` falls back to the raw input string when `URI.parse` fails and later serializes it with `value.to_s` without removing or escaping `\r` or `\n` characters. That value is embedded directly into the final ICS line by the normal serializer, so a payload containing CRLF can terminate the original property and create a new ICS property or component. (It looks like you can inject via url, source, image, organizer, attach, attendee, conference, tzurl because of this). Applications that generate `.ics` files from partially untrusted metadata are impacted. As a result, downstream calendar clients or importers may process attacker-supplied content as if it were legitimate event data, such as added attendees, modified URLs, alarms, or other calendar fields. Version 2.12.2 contains a patch for the issue. | |
| Title | iCalendar has ICS injection via unsanitized URI property values | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T11:33:48.950Z
Reserved: 2026-03-23T14:24:11.619Z
Link: CVE-2026-33635
Updated: 2026-03-30T11:33:45.440Z
Status : Analyzed
Published: 2026-03-26T21:17:07.287
Modified: 2026-04-10T15:49:23.240
Link: CVE-2026-33635
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:28:19Z
Github GHSA