Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c4r5-fxqw-vh93 Ruby LSP has arbitrary code execution through branch setting
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9.
Title Ruby LSP has arbitrary code execution through branch setting
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T01:59:51.170Z

Reserved: 2026-03-25T16:21:40.866Z

Link: CVE-2026-34060

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-31T03:15:58.773

Modified: 2026-03-31T03:15:58.773

Link: CVE-2026-34060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses