Skip to content

activesupport-7.2.3.gem: 3 vulnerabilities (highest severity is: 7.5) #233

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - activesupport-7.2.3.gem

A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.

Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem

Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock

Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem

Vulnerabilities

Vulnerability Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (activesupport version) Remediation Possible** Reachability
CVE-2026-33176 High 7.5 Not Defined 0.0% activesupport-7.2.3.gem Direct https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.5,https://github.com/rails/rails.git - v8.1.2.1
CVE-2026-33169 Medium 5.3 Not Defined 0.0% activesupport-7.2.3.gem Direct https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v7.2.3.1
CVE-2026-33170 Medium 4.3 Not Defined 0.0% activesupport-7.2.3.gem Direct https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.5

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-33176

Vulnerable Library - activesupport-7.2.3.gem

A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.

Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem

Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock

Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem

Dependency Hierarchy:

  • activesupport-7.2.3.gem (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Support number helpers accept strings containing scientific notation (e.g. "1e10000"), which "BigDecimal" expands into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

Publish Date: 2026-03-23

URL: CVE-2026-33176

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-03-23

Fix Resolution: https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.5,https://github.com/rails/rails.git - v8.1.2.1

In order to enable automatic remediation, please create workflow rules

CVE-2026-33169

Vulnerable Library - activesupport-7.2.3.gem

A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.

Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem

Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock

Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem

Dependency Hierarchy:

  • activesupport-7.2.3.gem (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. "NumberToDelimitedConverter" uses a lookahead-based regular expression with "gsub!" to insert thousands delimiters. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, the interaction between the repeated lookahead group and "gsub!" can produce quadratic time complexity on long digit strings. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

Publish Date: 2026-03-23

URL: CVE-2026-33169

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-03-23

Fix Resolution: https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v7.2.3.1

In order to enable automatic remediation, please create workflow rules

CVE-2026-33170

Vulnerable Library - activesupport-7.2.3.gem

A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.

Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem

Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock

Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem

Dependency Hierarchy:

  • activesupport-7.2.3.gem (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, "SafeBuffer#%" does not propagate the "@html_unsafe" flag to the newly created buffer. If a "SafeBuffer" is mutated in place (e.g. via "gsub!") and then formatted with "%" using untrusted arguments, the result incorrectly reports "html_safe? == true", bypassing ERB auto-escaping and possibly leading to XSS. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

Publish Date: 2026-03-23

URL: CVE-2026-33170

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-03-23

Fix Resolution: https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.5

In order to enable automatic remediation, please create workflow rules


In order to enable automatic remediation for this issue, please create workflow rules

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions