Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rack-session
  4. ›
  5. CVE-2026-39324

CVE-2026-39324: Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization

April 8, 2026

Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret.

Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access.

References

  • github.com/advisories/GHSA-33qg-7wpp-89cq
  • github.com/rack/rack-session
  • github.com/rack/rack-session/security/advisories/GHSA-33qg-7wpp-89cq
  • nvd.nist.gov/vuln/detail/CVE-2026-39324

Code Behaviors & Features

Detect and mitigate CVE-2026-39324 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.1.2

Fixed versions

  • 2.1.2

Solution

Upgrade to version 2.1.2 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication
  • CWE-345: Insufficient Verification of Data Authenticity
  • CWE-502: Deserialization of Untrusted Data
  • CWE-565: Reliance on Cookies without Validation and Integrity Checking

Source file

gem/rack-session/CVE-2026-39324.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:11 +0000.