CVE-2026-33167 PUBLISHED

Rails has a possible XSS vulnerability in its Action Pack debug exceptions

Assigner: GitHub_M
Reserved: 17.03.2026 Published: 23.03.2026 Updated: 23.03.2026

Action Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (config.consider_all_requests_local = true), which is the default in development. Version 8.1.2.1 contains a patch.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
CVSS Score: 1.3

Product Status

Vendor rails
Product actionpack
Versions
  • Version >= 8.1.0, < 8.1.2.1 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE