Tools
Tools: Ultimate Guide: CVE-2026-33195: CVE-2026-33195: Path Traversal Vulnerability in Ruby on Rails Active Storage DiskService
2026-03-24
0 views
admin
CVE-2026-33195: Path Traversal Vulnerability in Ruby on Rails Active Storage DiskService
Technical Details
Affected Systems
Code Analysis
Commit: 4933c1e
Commit: a290c8a
Commit: 9b06fbc
Mitigation Strategies
References Vulnerability ID: CVE-2026-33195 CVSS Score: 8.0 Published: 2026-03-23 Ruby on Rails Active Storage contains a path traversal vulnerability in the DiskService component. Applications allowing user-controllable keys expose arbitrary file read, write, and deletion capabilities to unauthenticated attackers due to inadequate path sanitization. A path traversal flaw in Rails Active Storage (CVSS 8.0) allows attackers to read or write arbitrary system files if the application permits user-defined blob keys. Patches are available in versions 7.2.3.1, 8.0.4.1, and 8.1.2.1. Read the full report for CVE-2026-33195 on our website for more details including interactive diagrams and full exploit analysis. Templates let you quickly answer FAQs or store snippets for re-use. Are you sure you want to ? It will become hidden in your post, but will still be visible via the comment's permalink. as well , this person and/or - CWE ID: CWE-22 - Attack Vector: Network - CVSS Score: 8.0 - Impact: Arbitrary File Read/Write/Delete - Exploit Status: Unweaponized - KEV Status: Not Listed - Ruby on Rails (Active Storage component) - Systems utilizing DiskService for local file storage - activestorage: < 7.2.3.1 (Fixed in: 7.2.3.1) - activestorage: >= 8.0.0.beta1, < 8.0.4.1 (Fixed in: 8.0.4.1) - activestorage: >= 8.1.0.beta1, < 8.1.2.1 (Fixed in: 8.1.2.1) - Upgrade the activestorage gem to a patched version (7.2.3.1, 8.0.4.1, or 8.1.2.1). - Implement application-level input validation on custom endpoints that allow user-defined blob keys. - Audit custom ActiveStorage::Service implementations for similar path resolution vulnerabilities. - Identify all applications utilizing the activestorage gem. - Determine if the application configuration uses DiskService for local storage. - Update the Gemfile to require a patched version of Rails/activestorage. - Run bundle update activestorage to apply the patch. - Deploy the updated application to production environments. - GitHub Advisory (GHSA-9xrj-h377-fr87)
toolsutilitiessecurity toolsultimateguide33195traversalvulnerabilityrailsactive