Description

Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.

INFO

Published Date :

2026-04-02T17:10:17.091Z

Last Modified :

2026-04-03T18:13:06.632Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-26962 vulnerability.

Vendors Products
Rack
  • Rack
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26962.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact