Home

Description

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename starts with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index contains an anchor whose `href` is exactly `javascript:alert(1)`. Clicking the entry executes JavaScript in the browser (demonstrated with `alert(1)`). Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.

PUBLISHED Reserved 2026-02-02 | Published 2026-02-18 | Updated 2026-02-18 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.2.22
affected

>= 3.0.0.beta1, < 3.1.20
affected

>= 3.2.0, < 3.2.5
affected

References

github.com/rack/rack/security/advisories/GHSA-whrj-4476-wvmp

github.com/...ommit/f2f225f297b99fbee3d9f51255d41f601fc40aff

cve.org (CVE-2026-25500)

nvd.nist.gov (CVE-2026-25500)

Download JSON