Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c4r5-fxqw-vh93 | Ruby LSP has arbitrary code execution through branch setting |
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shopify
Shopify ruby-lsp Shopify shopify.ruby-lsp |
|
| Vendors & Products |
Shopify
Shopify ruby-lsp Shopify shopify.ruby-lsp |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9. | |
| Title | Ruby LSP has arbitrary code execution through branch setting | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T14:51:58.711Z
Reserved: 2026-03-25T16:21:40.866Z
Link: CVE-2026-34060
Updated: 2026-04-02T14:51:50.959Z
Status : Awaiting Analysis
Published: 2026-03-31T03:15:58.773
Modified: 2026-04-02T15:16:41.003
Link: CVE-2026-34060
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:39:36Z
Github GHSA