CVE-2026-33202: Glob Injection and Arbitrary File Deletion in Rails Active Storage
Vulnerability ID: CVE-2026-33202
CVSS Score: 6.6
Published: 2026-03-23
CVE-2026-33202 is a Medium severity vulnerability in the Ruby on Rails Active Storage component (DiskService). It permits attackers to perform glob injection attacks due to improper neutralization of metacharacters, potentially leading to unauthorized deletion of arbitrary files within the storage directory.
TL;DR
A glob injection vulnerability in Rails Active Storage DiskService allows attackers who can control file prefixes to delete arbitrary files within the storage root directory.
Technical Details
- CWE ID: CWE-74 (Glob Injection)
- Attack Vector: Network
- CVSS v4.0 Score: 6.6 (Medium)
- Primary Impact: Arbitrary File Deletion (High Integrity Loss)
- Exploit Status: Unproven / No Active Exploitation
- CISA KEV: Not Listed
Affected Systems
- Ruby on Rails
- Active Storage
- DiskService
-
Active Storage (Rails): >= 8.1.0.beta1, < 8.1.2.1 (Fixed in:
8.1.2.1) -
Active Storage (Rails): >= 8.0.0.beta1, < 8.0.4.1 (Fixed in:
8.0.4.1) -
Active Storage (Rails): < 7.2.3.1 (Fixed in:
7.2.3.1)
Code Analysis
Commit: 8c9676b
Primary fix implementing escape_glob_metacharacters in DiskService
Commit: 955284d
Additional patch adjustments for path resolution
Commit: fa19073
Test cases and minor adjustments for DiskService fix
Mitigation Strategies
- Upgrade the
activestorageRubyGem to the latest patch release provided by the vendor. - Implement strict input validation on all user-controlled data that influences Active Storage blob keys or prefixes.
- Enforce an alphanumeric allowlist for file keys to preemptively reject glob metacharacters.
Remediation Steps:
- Identify the current version of the Rails framework and
activestoragegem used in the application. - Update the
Gemfileto require a patched version (8.1.2.1, 8.0.4.1, or 7.2.3.1). - Run
bundle update activestorageto apply the update. - Execute the application test suite to ensure the path resolution changes do not break existing file management workflows.
- Deploy the updated application to production environments.
References
Read the full report for CVE-2026-33202 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)