๐Ÿ” CVE Alert

CVE-2026-33168

UNKNOWN 0.0

Rails has a possible XSS vulnerability in its Action View tag helpers

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
4th

Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

CWE CWE-79
Vendor rails
Product actionview
Published Mar 23, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for rails actionview

Be the first to know when new unknown vulnerabilities affecting rails actionview are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

rails / actionview
>= 8.1.0.beta1, < 8.1.2.1 >= 8.0.0.beta1, < 8.0.4.1 < 7.2.3.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq github.com: https://github.com/rails/rails/commit/0b6f8002b52b9c606fd6be9e7915d9f944cf539c github.com: https://github.com/rails/rails/commit/63f5ad83edaa0b976f82d46988d745426aa4a42d github.com: https://github.com/rails/rails/commit/c79a07df1e88738df8f68cb0ee759ad6128ca924 github.com: https://github.com/rails/rails/releases/tag/v7.2.3.1 github.com: https://github.com/rails/rails/releases/tag/v8.0.4.1 github.com: https://github.com/rails/rails/releases/tag/v8.1.2.1