Home

Description

ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other public methods that also evaluate `@src` via `eval()` were not given the same guard: `ERB#def_method`, `ERB#def_module`, and `ERB#def_class`. An attacker who can trigger `Marshal.load` on untrusted data in a Ruby application that has `erb` loaded can use `ERB#def_module` (zero-arg, default parameters) as a code execution sink, bypassing the `@_init` protection entirely. ERB 4.0.3.1, 4.0.4.1, 6.0.1.1, and 6.0.4 patch the issue.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-24 | Updated 2026-04-25 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-693: Protection Mechanism Failure

Product status

< 4.0.3.1
affected

= 4.0.4
affected

>= 5.0.0, < 6.0.1.1
affected

>= 6.0.2, < 6.0.4
affected

References

github.com/ruby/erb/security/advisories/GHSA-q339-8rmv-2mhv

cve.org (CVE-2026-41316)

nvd.nist.gov (CVE-2026-41316)

Download JSON