CVE-2026-33174
Rails Active Storage has a possible DoS vulnerability when in proxy mode via Range requests
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
4th
Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when serving files through Active Storage's proxy delivery mode, the proxy controller loads the entire requested byte range into memory before sending it. A request with a large or unbounded Range header (e.g. `bytes=0-`) could cause the server to allocate memory proportional to the file size, possibly resulting in a DoS vulnerability through memory exhaustion. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
| CWE | CWE-789 |
| Vendor | rails |
| Product | activestorage |
| Published | Mar 23, 2026 |
| Last Updated | Mar 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for rails activestorage
Be the first to know when new unknown vulnerabilities affecting rails activestorage are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
rails / activestorage
>= 8.1.0.beta1, < 8.1.2.1 >= 8.0.0.beta1, < 8.0.4.1 < 7.2.3.1
References
github.com: https://github.com/rails/rails/security/advisories/GHSA-r46p-8f7g-vvvg github.com: https://github.com/rails/rails/commit/2cd933c366b777f873d4d590127da2f4a25e4ba5 github.com: https://github.com/rails/rails/commit/42012eaaa88dfc7d0030161b2bc8074a7bbce92a github.com: https://github.com/rails/rails/commit/8159a9c3de3f27a2bcf2866b8bf9ceb9075e229b github.com: https://github.com/rails/rails/releases/tag/v7.2.3.1 github.com: https://github.com/rails/rails/releases/tag/v8.0.4.1 github.com: https://github.com/rails/rails/releases/tag/v8.1.2.1