CVE-2026-33168
Rails has a possible XSS vulnerability in its Action View tag helpers
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
4th
Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
| CWE | CWE-79 |
| Vendor | rails |
| Product | actionview |
| Published | Mar 23, 2026 |
| Last Updated | Mar 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for rails actionview
Be the first to know when new unknown vulnerabilities affecting rails actionview are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
rails / actionview
>= 8.1.0.beta1, < 8.1.2.1 >= 8.0.0.beta1, < 8.0.4.1 < 7.2.3.1
References
github.com: https://github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq github.com: https://github.com/rails/rails/commit/0b6f8002b52b9c606fd6be9e7915d9f944cf539c github.com: https://github.com/rails/rails/commit/63f5ad83edaa0b976f82d46988d745426aa4a42d github.com: https://github.com/rails/rails/commit/c79a07df1e88738df8f68cb0ee759ad6128ca924 github.com: https://github.com/rails/rails/releases/tag/v7.2.3.1 github.com: https://github.com/rails/rails/releases/tag/v8.0.4.1 github.com: https://github.com/rails/rails/releases/tag/v8.1.2.1