CVE-2026-33173: CWE-925: Improper Verification of Intent by Broadcast Receiver in rails activestorage
CVE-2026-33173 is a medium severity vulnerability in Rails Active Storage prior to versions 8. 1. 2. 1, 8. 0. 4. 1, and 7. 2. 3. 1.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-33173 affects the Active Storage component of the Ruby on Rails framework, specifically versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1. Active Storage enables Rails applications to attach files from cloud or local sources. The flaw resides in the DirectUploadsController, which accepts arbitrary metadata from clients and persists it on the blob object. Crucially, internal flags such as 'identified' and 'analyzed'—which control MIME type detection and content analysis—are stored within this metadata hash. Because clients can set these flags directly, an attacker can craft a direct upload request that sets these flags to true, effectively bypassing the automatic MIME detection and analysis mechanisms. This allows the attacker to upload arbitrary content while falsely claiming a safe content type, circumventing any validations or security controls that rely on Active Storage's content type verification. The vulnerability does not require authentication but does require user interaction to upload files. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality and integrity. No known exploits are currently reported in the wild. The issue is addressed in versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, where the metadata handling has been corrected to prevent client-side manipulation of internal flags.
Potential Impact
This vulnerability can have significant impacts on organizations using affected versions of Rails Active Storage. By bypassing MIME type detection, attackers can upload malicious files disguised as safe content types, potentially leading to malware distribution, unauthorized code execution, or defacement if the files are served or processed without additional validation. This undermines the integrity of file upload controls and can facilitate further exploitation chains, especially in web applications that rely heavily on Active Storage for handling user-uploaded content. The ability to upload arbitrary content without proper validation increases the risk of server compromise, data leakage, or service disruption. Organizations with public-facing file upload features are particularly at risk, as attackers can exploit this vulnerability remotely over the network without authentication. The medium severity rating indicates a moderate risk, but the actual impact depends on how the uploaded files are used or processed downstream in the application environment.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Rails Active Storage to versions 8.1.2.1, 8.0.4.1, or 7.2.3.1 or later, where the issue is patched. Beyond upgrading, developers should implement additional server-side validation of uploaded files independent of Active Storage's automatic MIME detection. This includes verifying file content types using trusted libraries or services, restricting allowed file types and sizes, and scanning uploads for malware. Employing Content Security Policy (CSP) headers and isolating uploaded files in non-executable directories can reduce the risk of malicious file execution. Logging and monitoring upload activities for anomalies can help detect exploitation attempts. If immediate upgrading is not feasible, temporarily disabling direct uploads or restricting upload functionality to trusted users can reduce exposure. Regularly reviewing and updating dependencies and maintaining a secure development lifecycle will help prevent similar issues.
Affected Countries
United States, United Kingdom, Germany, France, Japan, Australia, Canada, India, Netherlands, Brazil, South Korea, Singapore
CVE-2026-33173: CWE-925: Improper Verification of Intent by Broadcast Receiver in rails activestorage
Description
CVE-2026-33173 is a medium severity vulnerability in Rails Active Storage prior to versions 8. 1. 2. 1, 8. 0. 4. 1, and 7. 2. 3. 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-33173 affects the Active Storage component of the Ruby on Rails framework, specifically versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1. Active Storage enables Rails applications to attach files from cloud or local sources. The flaw resides in the DirectUploadsController, which accepts arbitrary metadata from clients and persists it on the blob object. Crucially, internal flags such as 'identified' and 'analyzed'—which control MIME type detection and content analysis—are stored within this metadata hash. Because clients can set these flags directly, an attacker can craft a direct upload request that sets these flags to true, effectively bypassing the automatic MIME detection and analysis mechanisms. This allows the attacker to upload arbitrary content while falsely claiming a safe content type, circumventing any validations or security controls that rely on Active Storage's content type verification. The vulnerability does not require authentication but does require user interaction to upload files. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality and integrity. No known exploits are currently reported in the wild. The issue is addressed in versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, where the metadata handling has been corrected to prevent client-side manipulation of internal flags.
Potential Impact
This vulnerability can have significant impacts on organizations using affected versions of Rails Active Storage. By bypassing MIME type detection, attackers can upload malicious files disguised as safe content types, potentially leading to malware distribution, unauthorized code execution, or defacement if the files are served or processed without additional validation. This undermines the integrity of file upload controls and can facilitate further exploitation chains, especially in web applications that rely heavily on Active Storage for handling user-uploaded content. The ability to upload arbitrary content without proper validation increases the risk of server compromise, data leakage, or service disruption. Organizations with public-facing file upload features are particularly at risk, as attackers can exploit this vulnerability remotely over the network without authentication. The medium severity rating indicates a moderate risk, but the actual impact depends on how the uploaded files are used or processed downstream in the application environment.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Rails Active Storage to versions 8.1.2.1, 8.0.4.1, or 7.2.3.1 or later, where the issue is patched. Beyond upgrading, developers should implement additional server-side validation of uploaded files independent of Active Storage's automatic MIME detection. This includes verifying file content types using trusted libraries or services, restricting allowed file types and sizes, and scanning uploads for malware. Employing Content Security Policy (CSP) headers and isolating uploaded files in non-executable directories can reduce the risk of malicious file execution. Logging and monitoring upload activities for anomalies can help detect exploitation attempts. If immediate upgrading is not feasible, temporarily disabling direct uploads or restricting upload functionality to trusted users can reduce exposure. Regularly reviewing and updating dependencies and maintaining a secure development lifecycle will help prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T22:16:36.719Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c1d4a7f4197a8e3ba0b3d0
Added to database: 3/24/2026, 12:02:47 AM
Last enriched: 3/24/2026, 12:03:08 AM
Last updated: 3/24/2026, 4:41:33 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.