Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qcfx-2mfw-w4cg | Rails Active Storage has possible content type bypass via metadata in direct uploads |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1287 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails activestorage |
|
| Vendors & Products |
Rails
Rails activestorage |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `DirectUploadsController` accepts arbitrary metadata from the client and persists it on the blob. Because internal flags like `identified` and `analyzed` are stored in the same metadata hash, a direct-upload client can set these flags to skip MIME detection and analysis. This allows an attacker to upload arbitrary content while claiming a safe `content_type`, bypassing any validations that rely on Active Storage's automatic content type identification. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. | |
| Title | Rails Active Storage has possible content type bypass via metadata in direct uploads | |
| Weaknesses | CWE-925 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-23T23:21:29.843Z
Reserved: 2026-03-17T22:16:36.719Z
Link: CVE-2026-33173
No data.
Status : Received
Published: 2026-03-24T00:16:28.457
Modified: 2026-03-24T00:16:28.457
Link: CVE-2026-33173
OpenCVE Enrichment
Updated: 2026-03-24T10:29:58Z
Github GHSA