CVE-2026-33202: Rails Active Storage has possible glob injection in its DiskService
Active Storage’s DiskService#delete_prefixed passes blob keys directly to Dir.glob without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharacters, it may be possible to delete unintended files from the storage directory.
References
- github.com/advisories/GHSA-73f9-jhhh-hr5m
- github.com/rails/rails
- github.com/rails/rails/commit/8c9676b803820110548cdb7523800db43bc6874c
- github.com/rails/rails/commit/955284d26e469a9c026a4eee5b21f0414ab0bccf
- github.com/rails/rails/commit/fa19073546360856e9f4dab221fc2c5d73a45e82
- github.com/rails/rails/releases/tag/v7.2.3.1
- github.com/rails/rails/releases/tag/v8.0.4.1
- github.com/rails/rails/releases/tag/v8.1.2.1
- github.com/rails/rails/security/advisories/GHSA-73f9-jhhh-hr5m
- nvd.nist.gov/vuln/detail/CVE-2026-33202
Code Behaviors & Features
Detect and mitigate CVE-2026-33202 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →