U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-33173 Detail

Description

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `DirectUploadsController` accepts arbitrary metadata from the client and persists it on the blob. Because internal flags like `identified` and `analyzed` are stored in the same metadata hash, a direct-upload client can set these flags to skip MIME detection and analysis. This allows an attacker to upload arbitrary content while claiming a safe `content_type`, bypassing any validations that rely on Active Storage's automatic content type identification. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

Nist CVSS score does not match with CNA score
CNA:  GitHub, Inc.
CVSS-B 5.3 MEDIUM
Vector:  CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://github.com/rails/rails/commit/707c0f1f41f067fdf96d54e99d43b28dfaae7e53 GitHub, Inc.
https://github.com/rails/rails/commit/8fcb934caadc79c8cc4ce53287046d0f67005b3e GitHub, Inc.
https://github.com/rails/rails/commit/d9502f5214e2198245a4c1defe9cd02a7c8057d0 GitHub, Inc.
https://github.com/rails/rails/releases/tag/v7.2.3.1 GitHub, Inc.
https://github.com/rails/rails/releases/tag/v8.0.4.1 GitHub, Inc.
https://github.com/rails/rails/releases/tag/v8.1.2.1 GitHub, Inc.
https://github.com/rails/rails/security/advisories/GHSA-qcfx-2mfw-w4cg GitHub, Inc.

Weakness Enumeration

CWE-ID CWE Name Source
CWE-925 Improper Verification of Intent by Broadcast Receiver GitHub, Inc.  

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-33173
NVD Published Date:
03/23/2026
NVD Last Modified:
03/23/2026
Source:
GitHub, Inc.