Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-33qg-7wpp-89cq | Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization |
Ubuntu USN |
USN-8190-2 | Rack::Session vulnerability |
Wed, 15 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rack:rack-session:*:*:*:*:*:ruby:*:* | |
| Metrics |
cvssV3_1
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rack
Rack rack-session |
|
| Vendors & Products |
Rack
Rack rack-session |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rack::Session is a session management implementation for Rack. From 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access. This vulnerability is fixed in 2.1.2. | |
| Title | Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization | |
| Weaknesses | CWE-287 CWE-345 CWE-502 CWE-565 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T18:44:07.145Z
Reserved: 2026-04-06T19:31:07.266Z
Link: CVE-2026-39324
Updated: 2026-04-08T18:44:00.411Z
Status : Analyzed
Published: 2026-04-07T18:16:43.387
Modified: 2026-04-15T20:17:18.877
Link: CVE-2026-39324
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:46:43Z
Github GHSA
Ubuntu USN