CVE-2026-33169: Rails Active Support has a possible ReDoS vulnerability in number_to_delimited
NumberToDelimitedConverter used a regular expression with gsub! to insert thousands delimiters. This could produce quadratic time complexity on long digit strings.
References
- github.com/advisories/GHSA-cg4j-q9v8-6v38
- github.com/rails/rails
- github.com/rails/rails/commit/29154f1097da13d48fdb3200760b3e3da66dcb11
- github.com/rails/rails/commit/b54a4b373c6f042cab6ee2033246b1c9ecc38974
- github.com/rails/rails/commit/ec1a0e215efd27a3b3911aae6df978a80f456a49
- github.com/rails/rails/releases/tag/v7.2.3.1
- github.com/rails/rails/releases/tag/v8.0.4.1
- github.com/rails/rails/releases/tag/v8.1.2.1
- github.com/rails/rails/security/advisories/GHSA-cg4j-q9v8-6v38
- nvd.nist.gov/vuln/detail/CVE-2026-33169
Code Behaviors & Features
Detect and mitigate CVE-2026-33169 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →