Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33202: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in rails activestorage

0
Medium
VulnerabilityCVE-2026-33202cvecve-2026-33202cwe-74
Published: Mon Mar 23 2026 (03/23/2026, 23:34:52 UTC)
Source: CVE Database V5
Vendor/Project: rails
Product: activestorage

Description

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#delete_prefixed` passes blob keys directly to `Dir.glob` without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharacters, it may be possible to delete unintended files from the storage directory. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:14:49 UTC

Technical Analysis

The vulnerability CVE-2026-33202 affects the Active Storage module of Ruby on Rails, specifically the DiskService#delete_prefixed method. Active Storage is used to attach cloud and local files in Rails applications. In affected versions (>= 8.1.0.beta1, < 8.1.2.1; >= 8.0.0.beta1, < 8.0.4.1; and < 7.2.3.1), the method passes blob keys directly to the Ruby Dir.glob function without escaping glob metacharacters such as '*', '?', '[', and ']'. Glob metacharacters are interpreted by Dir.glob to match multiple files or patterns. If an attacker can control or influence the blob key values, they can craft keys containing glob metacharacters that cause Dir.glob to match and delete unintended files beyond the intended scope. This improper neutralization of special elements in output used by a downstream component is categorized under CWE-74 (Injection). The vulnerability allows deletion of arbitrary files within the storage directory, potentially leading to data loss or denial of service. Exploitation requires no privileges or user interaction and can be performed remotely if the application accepts attacker-controlled blob keys. The issue has been addressed in Rails versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 by properly escaping glob metacharacters before passing blob keys to Dir.glob, preventing unintended file deletions.

Potential Impact

This vulnerability can lead to unintended deletion of files within the storage directory used by Active Storage in Rails applications. The impact includes potential data loss, disruption of application functionality, and denial of service if critical files are removed. Since Active Storage is commonly used for managing user-uploaded files, cloud attachments, and local file storage, exploitation could affect application data integrity and availability. The vulnerability does not allow remote code execution or privilege escalation but can cause significant operational impact by corrupting or deleting stored data. Organizations relying on vulnerable Rails versions risk data integrity issues and service interruptions, especially if blob keys can be influenced by untrusted users or external inputs. The lack of authentication or user interaction requirements increases the risk of exploitation in exposed web applications.

Mitigation Recommendations

Organizations should immediately upgrade Rails Active Storage to versions 8.1.2.1, 8.0.4.1, or 7.2.3.1 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement input validation and sanitization to ensure blob keys do not contain glob metacharacters before they reach the DiskService#delete_prefixed method. Restrict the ability to create or influence blob keys to trusted users or internal processes only. Employ file system permissions to limit the scope of deletions to only necessary directories, preventing broader file deletions. Monitor application logs for unusual file deletion patterns or errors related to Active Storage. Conduct code reviews to ensure no other parts of the application pass unescaped user input to file system globbing functions. Finally, maintain regular backups of storage directories to enable recovery in case of accidental or malicious deletions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T23:23:58.312Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d434f4197a8e3ba04297

Added to database: 3/24/2026, 12:00:52 AM

Last enriched: 3/24/2026, 12:14:49 AM

Last updated: 3/24/2026, 5:17:32 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses