CVE-2026-33168: Rails has a possible XSS vulnerability in its Action View tag helpers
When a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected.
References
- github.com/advisories/GHSA-v55j-83pf-r9cq
- github.com/rails/rails
- github.com/rails/rails/commit/0b6f8002b52b9c606fd6be9e7915d9f944cf539c
- github.com/rails/rails/commit/63f5ad83edaa0b976f82d46988d745426aa4a42d
- github.com/rails/rails/commit/c79a07df1e88738df8f68cb0ee759ad6128ca924
- github.com/rails/rails/releases/tag/v7.2.3.1
- github.com/rails/rails/releases/tag/v8.0.4.1
- github.com/rails/rails/releases/tag/v8.1.2.1
- github.com/rails/rails/security/advisories/GHSA-v55j-83pf-r9cq
- nvd.nist.gov/vuln/detail/CVE-2026-33168
Code Behaviors & Features
Detect and mitigate CVE-2026-33168 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →