| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v55j-83pf-r9cq | Rails has a possible XSS vulnerability in its Action View tag helpers |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rubyonrails
Rubyonrails actionview |
|
| Vendors & Products |
Rubyonrails
Rubyonrails actionview |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. | |
| Title | Rails has a possible XSS vulnerability in its Action View tag helpers | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-23T23:19:11.173Z
Reserved: 2026-03-17T21:17:08.888Z
Link: CVE-2026-33168
No data.
Status : Received
Published: 2026-03-23T23:17:12.873
Modified: 2026-03-23T23:17:12.873
Link: CVE-2026-33168
OpenCVE Enrichment
Updated: 2026-03-24T10:30:02Z
Github GHSA