CVE-2026-33167

Source
https://cve.org/CVERecord?id=CVE-2026-33167
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33167.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-33167
Aliases
Downstream
Related
Published
2026-03-23T22:58:53.577Z
Modified
2026-04-02T13:27:08.053639Z
Severity
  • 1.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U CVSS Calculator
Summary
Rails has a possible XSS vulnerability in its Action Pack debug exceptions
Details

Action Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (config.consider_all_requests_local = true), which is the default in development. Version 8.1.2.1 contains a patch.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33167.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/rails/rails

Affected ranges

Type
GIT
Repo
https://github.com/rails/rails
Events
Database specific
{
    "versions": [
        {
            "introduced": "8.1.0"
        },
        {
            "fixed": "8.1.2.1"
        }
    ]
}

Affected versions

v8.*
v8.1.0
v8.1.1
v8.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33167.json"