CVE-2026-25500

Source
https://cve.org/CVERecord?id=CVE-2026-25500
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-25500.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-25500
Aliases
Downstream
Related
Published
2026-02-18T18:59:31.964Z
Modified
2026-05-18T05:58:36.350282554Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Rack's Stored XSS in Rack::Directory via javascript: filenames rendered into anchor href
Details

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, Rack::Directory generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename starts with the javascript: scheme (e.g. javascript:alert(1)), the generated index contains an anchor whose href is exactly javascript:alert(1). Clicking the entry executes JavaScript in the browser (demonstrated with alert(1)). Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25500.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/rack/rack

Affected ranges

Type
GIT
Repo
https://github.com/rack/rack
Events

Affected versions

v3.*
v3.2.0
v3.2.1
v3.2.2
v3.2.3
v3.2.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-25500.json"