Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33195: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in rails activestorage

0
High
VulnerabilityCVE-2026-33195cvecve-2026-33195cwe-22
Published: Mon Mar 23 2026 (03/23/2026, 23:31:41 UTC)
Source: CVE Database V5
Vendor/Project: rails
Product: activestorage

Description

CVE-2026-33195 is a high-severity path traversal vulnerability in the Rails Active Storage component affecting versions prior to 8. 1. 2. 1, 8. 0. 4. 1, and 7. 2. 3. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:27:46 UTC

Technical Analysis

The vulnerability CVE-2026-33195 affects the Active Storage component of the Ruby on Rails framework, specifically in the DiskService#path_for method. Active Storage is used to attach and manage cloud and local files in Rails applications. Prior to patched versions (8.1.2.1, 8.0.4.1, and 7.2.3.1), the method responsible for resolving file paths does not enforce that the final resolved path remains within the intended storage root directory. This lack of validation allows an attacker to craft blob keys containing path traversal sequences such as '../' to escape the storage directory and access arbitrary filesystem locations. Although blob keys are expected to be trusted strings generated internally, some applications may mistakenly use user-supplied input as blob keys, exposing them to this vulnerability. Successful exploitation can allow an attacker to read sensitive files, overwrite critical data, or delete files on the server, potentially leading to full system compromise or denial of service. The vulnerability has a CVSS 4.0 base score of 8.0, reflecting its high severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity. No known exploits are currently reported in the wild, but the risk remains significant given the widespread use of Rails in web applications. The issue was publicly disclosed and patched in March 2026, and users are strongly advised to upgrade to the fixed versions to prevent exploitation.

Potential Impact

This vulnerability poses a severe risk to organizations running web applications built on vulnerable versions of Rails Active Storage. Exploitation can lead to unauthorized disclosure of sensitive files, modification or deletion of critical data, and potentially full server compromise. The ability to read arbitrary files can expose credentials, configuration files, or proprietary information. Writing or deleting files can disrupt application functionality or enable further attacks such as webshell deployment. Since Rails is widely used globally in various industries including finance, healthcare, e-commerce, and government, the impact can be broad and severe. Organizations that improperly handle blob keys by accepting user input are at the highest risk. The vulnerability can be exploited remotely without authentication or user interaction, increasing the likelihood of automated attacks. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score and ease of exploitation necessitate immediate action to prevent potential breaches and operational disruptions.

Mitigation Recommendations

Organizations should immediately upgrade Rails Active Storage to versions 8.1.2.1, 8.0.4.1, or 7.2.3.1 or later, which contain patches addressing this path traversal vulnerability. Until upgrades are possible, applications should enforce strict validation and sanitization of any blob keys, ensuring that user input is never directly used as a blob key. Implement application-level input validation to reject any keys containing path traversal sequences such as '../'. Employ filesystem permissions to restrict the Rails application’s access strictly to its storage directories, minimizing potential damage from path traversal. Monitor application logs for suspicious access patterns or attempts to use malformed blob keys. Conduct code reviews to verify that blob keys are generated internally and not derived from untrusted sources. Additionally, consider deploying Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts targeting Active Storage endpoints. Regularly audit and update dependencies to incorporate security patches promptly. Finally, maintain incident response readiness to quickly address any signs of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T22:16:36.721Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d434f4197a8e3ba0428e

Added to database: 3/24/2026, 12:00:52 AM

Last enriched: 3/31/2026, 8:27:46 PM

Last updated: 5/8/2026, 12:08:10 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses