Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33167: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rails actionpack

0
Low
VulnerabilityCVE-2026-33167cvecve-2026-33167cwe-79
Published: Mon Mar 23 2026 (03/23/2026, 22:58:53 UTC)
Source: CVE Database V5
Vendor/Project: rails
Product: actionpack

Description

CVE-2026-33167 is a low-severity cross-site scripting (XSS) vulnerability in the Rails Action Pack gem versions 8. 1. 0 through before 8. 1. 2. 1. The flaw occurs because the debug exceptions page does not properly escape exception messages, allowing an attacker to inject arbitrary HTML or JavaScript. This vulnerability affects applications with detailed exception pages enabled, which is the default setting in development environments. Exploitation requires no authentication but does require user interaction to trigger the crafted exception message. The vulnerability is patched in version 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:05:05 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33167 affects the Action Pack component of the Ruby on Rails framework, specifically versions on the 8.1 branch prior to 8.1.2.1. Action Pack is a core gem used for building web applications in Rails. The issue arises from improper neutralization of input during web page generation, categorized under CWE-79 (Cross-site Scripting). When an exception occurs, the debug exceptions page displays the exception message without proper escaping, allowing a malicious actor to craft exception messages containing arbitrary HTML or JavaScript. This injected code executes in the context of the debug page, potentially leading to XSS attacks. The vulnerability is only exploitable when the application is configured to show detailed exception pages (`config.consider_all_requests_local = true`), which is the default in development environments but typically disabled in production. The CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and scope. No known exploits are reported in the wild. The issue was addressed in version 8.1.2.1 of Action Pack by properly escaping exception messages on the debug page, preventing injection of malicious code.

Potential Impact

The primary impact of this vulnerability is the potential for cross-site scripting attacks within the debug exceptions page of affected Rails applications. Since detailed exception pages are usually enabled only in development or testing environments, the risk to production systems is minimal. However, if an application inadvertently exposes detailed exception pages in production or staging environments accessible to attackers, this vulnerability could allow injection and execution of arbitrary scripts. This could lead to theft of sensitive information such as session cookies, defacement of debug pages, or execution of malicious actions within the context of the affected web application. The vulnerability does not affect confidentiality, integrity, or availability of production data directly but could facilitate further attacks if exploited inappropriately configured environments. The low CVSS score reflects the limited attack surface and requirement for user interaction to trigger the vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade the Action Pack gem to version 8.1.2.1 or later, where the issue is patched. Additionally, it is critical to ensure that detailed exception pages (`config.consider_all_requests_local`) are disabled in production and publicly accessible environments to prevent exposure of debug information. Implement strict access controls and environment separation to avoid accidental exposure of development configurations. Developers should sanitize and validate all inputs that could influence exception messages. Monitoring and logging should be enhanced to detect unusual exception messages or attempts to trigger debug pages. Finally, conduct regular dependency audits and apply security patches promptly to minimize exposure to known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d4a7f4197a8e3ba0b403

Added to database: 3/24/2026, 12:02:47 AM

Last enriched: 3/24/2026, 12:05:05 AM

Last updated: 3/24/2026, 5:19:16 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses