CVE-2026-33174
Rails Active Storage has a possible DoS vulnerability when in proxy mode via Range requests
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when serving files through Active Storage's proxy delivery mode, the proxy controller loads the entire requested byte range into memory before sending it. A request with a large or unbounded Range header (e.g. `bytes=0-`) could cause the server to allocate memory proportional to the file size, possibly resulting in a DoS vulnerability through memory exhaustion. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Active Storage permite a los usuarios adjuntar archivos en la nube y locales en aplicaciones Rails. Antes de las versiones 8.1.2.1, 8.0.4.1 y 7.2.3.1, al servir archivos a través del modo de entrega de proxy de Active Storage, el controlador de proxy carga todo el rango de bytes solicitado en la memoria antes de enviarlo. Una solicitud con un encabezado Range grande o ilimitado (por ejemplo, 'bytes=0-') podría hacer que el servidor asigne memoria proporcional al tamaño del archivo, posiblemente resultando en una vulnerabilidad de DoS a través del agotamiento de la memoria. Las versiones 8.1.2.1, 8.0.4.1 y 7.2.3.1 contienen un parche.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2026-03-17 CVE Reserved
- 2026-03-23 CVE Published
- 2026-03-24 CVE Updated
- 2026-03-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-789: Memory Allocation with Excessive Size Value
CAPEC
References (7)
| URL | Tag | Source |
|---|---|---|
| https://github.com/rails/rails/releases/tag/v7.2.3.1 | Release Notes | |
| https://github.com/rails/rails/releases/tag/v8.0.4.1 | Release Notes | |
| https://github.com/rails/rails/releases/tag/v8.1.2.1 | Release Notes |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|---|---|
| https://github.com/rails/rails/security/advisories/GHSA-r46p-8f7g-vvvg | 2026-03-24 |
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | < 7.2.3.1 Search vendor "Rubyonrails" for product "Rails" and version " < 7.2.3.1" | - |
Affected
| ||||||
| Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | >= 8.0.0 < 8.0.4.1 Search vendor "Rubyonrails" for product "Rails" and version " >= 8.0.0 < 8.0.4.1" | - |
Affected
| ||||||
| Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | >= 8.1.0 < 8.1.2.1 Search vendor "Rubyonrails" for product "Rails" and version " >= 8.1.0 < 8.1.2.1" | - |
Affected
| ||||||
