CVE-2026-25500

NameCVE-2026-25500
DescriptionRack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename starts with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index contains an anchor whose `href` is exactly `javascript:alert(1)`. Clicking the entry executes JavaScript in the browser (demonstrated with `alert(1)`). Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-rack (PTS)bullseye2.1.4-3+deb11u2vulnerable
bullseye (security)2.1.4-3+deb11u4vulnerable
bookworm, bookworm (security)2.2.20-0+deb12u1vulnerable
trixie (security), trixie3.1.18-1~deb13u1vulnerable
forky3.1.18-1vulnerable
sid3.2.4-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-racksource(unstable)(unfixed)

Notes

https://github.com/rack/rack/security/advisories/GHSA-whrj-4476-wvmp
Fixed by: https://github.com/rack/rack/commit/f2f225f297b99fbee3d9f51255d41f601fc40aff (main)
Fixed by: https://github.com/rack/rack/commit/93a68f58aa82aa48f09b751501f19f5e760dd406 (v3.2.5)
Fixed by: https://github.com/rack/rack/commit/ed0f455074f9d6aade9793bd8a3dc4aeaecaacd6 (v3.1.20)
Fixed by: https://github.com/rack/rack/commit/175e7d206b8ff2bce4d98d7ba429adf73c674bfb (v2.2.22)

Search for package or bug name: Reporting problems