Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rack
  4. ›
  5. CVE-2026-26961

CVE-2026-26961: Rack's greedy multipart boundary parsing can cause parser differentials and WAF bypass.

April 2, 2026 (updated April 24, 2026)

Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first.

In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated.

References

  • github.com/advisories/GHSA-vgpv-f759-9wx3
  • github.com/rack/rack
  • github.com/rack/rack/security/advisories/GHSA-vgpv-f759-9wx3
  • nvd.nist.gov/vuln/detail/CVE-2026-26961

Code Behaviors & Features

Detect and mitigate CVE-2026-26961 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0.beta1 before 3.1.21, all versions before 2.2.23, all versions starting from 3.2.0 before 3.2.6

Fixed versions

  • 2.2.23
  • 3.1.21
  • 3.2.6

Solution

Upgrade to versions 2.2.23, 3.1.21, 3.2.6 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-436: Interpretation Conflict

Source file

gem/rack/CVE-2026-26961.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:07 +0000.