Rails has a possible XSS vulnerability in its Action View tag helpers
Published: March 23, 2026
SECURITY IDENTIFIERS
- CVE: CVE-2026-33168 (NVD)
- GHSA: GHSA-v55j-83pf-r9cq
- Vendor Advisory: https://github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq
GEM
FRAMEWORK
PATCHED VERSIONS
~> 7.2.3, >= 7.2.3.1
~> 8.0.4, >= 8.0.4.1
>= 8.1.2.1
DESCRIPTION
Impact
When a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected.
Releases
The fixed releases are available at the normal locations.
RELATED
- https://github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq
- https://github.com/rails/rails/commit/0b6f8002b52b9c606fd6be9e7915d9f944cf539c
- https://github.com/rails/rails/commit/63f5ad83edaa0b976f82d46988d745426aa4a42d
- https://github.com/rails/rails/commit/c79a07df1e88738df8f68cb0ee759ad6128ca924
- https://github.com/rails/rails/releases/tag/v7.2.3.1
- https://github.com/rails/rails/releases/tag/v8.0.4.1
- https://github.com/rails/rails/releases/tag/v8.1.2.1
- https://github.com/advisories/GHSA-v55j-83pf-r9cq
