CVE-2026-33173 PUBLISHED

Rails Active Storage has possible content type bypass via metadata in direct uploads

Assigner: GitHub_M
Reserved: 17.03.2026 Published: 23.03.2026 Updated: 24.03.2026

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, DirectUploadsController accepts arbitrary metadata from the client and persists it on the blob. Because internal flags like identified and analyzed are stored in the same metadata hash, a direct-upload client can set these flags to skip MIME detection and analysis. This allows an attacker to upload arbitrary content while claiming a safe content_type, bypassing any validations that rely on Active Storage's automatic content type identification. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor rails
Product activestorage
Versions
  • Version >= 8.1.0.beta1, < 8.1.2.1 is affected
  • Version >= 8.0.0.beta1, < 8.0.4.1 is affected
  • Version < 7.2.3.1 is affected

References

Problem Types

  • CWE-925: Improper Verification of Intent by Broadcast Receiver CWE