Description
Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#path_for` does not validate that the resolved filesystem path remains within the storage root directory. If a blob key containing path traversal sequences (e.g. `../`) is used, it could allow reading, writing, or deleting arbitrary files on the server. Blob keys are expected to be trusted strings, but some applications could be passing user input as keys and would be affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
INFO
Published Date :
2026-03-23T23:31:41.785Z
Last Modified :
2026-03-25T03:56:06.239Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33195 vulnerability.
| Vendors | Products |
|---|---|
| Rails |
|
| Rubyonrails |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33195.