CVE-2026-33167

NameCVE-2026-33167
DescriptionAction Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (`config.consider_all_requests_local = true`), which is the default in development. Version 8.1.2.1 contains a patch.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)bullseye2:6.0.3.7+dfsg-2+deb11u2fixed
bullseye (security)2:6.0.3.7+dfsg-2+deb11u4fixed
bookworm, bookworm (security)2:6.1.7.10+dfsg-1~deb12u2fixed
trixie (security), trixie2:7.2.2.2+dfsg-2~deb13u1fixed
forky2:7.2.3+dfsg-3fixed
sid2:7.2.3.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssource(unstable)(not affected)

Notes

- rails <not-affected> (Vulnerable code not present)
https://github.com/rails/rails/security/advisories/GHSA-pgm4-439c-5jp6
Fixed by: https://github.com/rails/rails/commit/6752711c8c31d79ba50d13af6a6698a3b85415e0 (v8.1.2.1)

Search for package or bug name: Reporting problems