Home

Description

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the target path starts with the root string, allowing directory listing outside the intended root. Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.

PUBLISHED Reserved 2026-01-12 | Published 2026-02-18 | Updated 2026-02-18 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-548: Exposure of Information Through Directory Listing

Product status

< 2.2.22
affected

>= 3.0.0.beta1, < 3.1.20
affected

>= 3.2.0, < 3.2.5
affected

References

github.com/rack/rack/security/advisories/GHSA-mxw3-3hh2-x2mh

github.com/...ommit/75c5745c286637a8f049a33790c71237762069e7

cve.org (CVE-2026-22860)

nvd.nist.gov (CVE-2026-22860)

Download JSON