{"id":"CVE-2022-32224","details":"A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record \u003c 7.0.3.1, \u003c6.1.6.1, \u003c6.0.5.1 and \u003c5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.","aliases":["GHSA-3hhc-qp5v-9p2j"],"modified":"2026-04-10T04:48:41.958166Z","published":"2022-12-05T22:15:10.397Z","related":["GHSA-3hhc-qp5v-9p2j","openSUSE-SU-2023:0009-1","openSUSE-SU-2024:12244-1","openSUSE-SU-2024:12879-1","openSUSE-SU-2024:14069-1","openSUSE-SU-2025:15112-1"],"references":[{"type":"FIX","url":"https://github.com/advisories/GHSA-3hhc-qp5v-9p2j"},{"type":"EVIDENCE","url":"https://groups.google.com/g/rubyonrails-security/c/MmFO3LYQE8U"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rails/rails","events":[{"introduced":"0"},{"fixed":"8030cff808657faa44828de001cd3b80364597de"},{"introduced":"66cabeda2c46c582d19738e1318be8d59584cc5b"},{"fixed":"eed417637b594b33b3b58b08dd41daa10c57e083"},{"introduced":"914caca2d31bd753f47f9168f2a375921d9e91cc"},{"fixed":"dc1242fd5a4d91e63846ab552a07e19ebf8716ac"},{"introduced":"984c3ef2775781d47efa9f541ce570daa2434a80"},{"fixed":"04972d9b9ef60796dc8f0917817b5392d61fcf09"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.2.8.1"},{"introduced":"6.0.0"},{"fixed":"6.0.5.1"},{"introduced":"6.1.0"},{"fixed":"6.1.6.1"},{"introduced":"7.0.0"},{"fixed":"7.0.3.1"}]}}],"versions":["v0.10.0","v0.10.1","v0.11.0","v0.11.1","v0.12.0","v0.13.0","v0.13.1","v0.14.1","v0.14.3","v0.9.1","v0.9.2","v0.9.3","v0.9.4","v0.9.4.1","v0.9.5","v1.1.0","v1.1.0_RC1","v1.1.1","v2.0.0","v2.0.0_PR","v2.0.0_RC1","v2.0.0_RC2","v2.0.1","v3.0.0.beta.3","v3.0.0.beta3","v3.1.0.beta1","v3.1.0.rc1","v3.2.0.rc1","v4.0.0.beta1","v4.0.0.rc1","v4.2.0.beta1","v5.0.0.beta1","v5.0.0.beta2","v5.0.0.beta4","v5.1.0.beta1","v5.2.0.rc1","v5.2.1.rc1","v5.2.5","v5.2.6","v5.2.7","v5.2.8","v6.0.0","v6.0.4","v6.0.5","v6.1.0","v6.1.1","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v7.0.0","v7.0.1","v7.0.2","v7.0.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32224.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}