{"id":"CVE-2026-33167","summary":"Rails has a possible XSS vulnerability in its Action Pack debug exceptions","details":"Action Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (`config.consider_all_requests_local = true`), which is the default in development. Version 8.1.2.1 contains a patch.","aliases":["GHSA-pgm4-439c-5jp6"],"modified":"2026-04-02T13:27:08.053639Z","published":"2026-03-23T22:58:53.577Z","related":["CGA-c97h-38xv-957r"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33167.json","cwe_ids":["CWE-79"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33167.json"},{"type":"FIX","url":"https://github.com/rails/rails/commit/6752711c8c31d79ba50d13af6a6698a3b85415e0"},{"type":"WEB","url":"https://github.com/rails/rails/releases/tag/v8.1.2.1"},{"type":"ADVISORY","url":"https://github.com/rails/rails/security/advisories/GHSA-pgm4-439c-5jp6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33167"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rails/rails","events":[{"introduced":"1cdd190a25e483b65f1f25bbd0f13a25d696b461"},{"fixed":"1db4b89687cc18311fc3f92623136705df24e671"}],"database_specific":{"versions":[{"introduced":"8.1.0"},{"fixed":"8.1.2.1"}]}}],"versions":["v8.1.0","v8.1.1","v8.1.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33167.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U"}]}