Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/actionview@4.0.0
purl pkg:gem/actionview@4.0.0
Tags Ghost
Next non-vulnerable version 6.1.7.3
Latest non-vulnerable version 8.1.2.1
Risk 10.0
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-86jq-2md2-d7ah
Aliases:
CVE-2016-6316
GHSA-pc3m-v286-2jwj
Possible XSS Vulnerability in ActionView There is a possible XSS vulnerability in Action View. Text declared as `HTML safe` will not have quotes escaped when used as attribute values in tag helpers.
4.2.7.1
Affected by 8 other vulnerabilities.
5.0.0.1
Affected by 8 other vulnerabilities.
VCID-8dad-dvat-1fg4
Aliases:
CVE-2019-5418
GHSA-86g5-2wh3-gc9j
Path Traversal in Action View # File Content Disclosure in Action View Impact ------ There is a possible file content disclosure vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. The impact is limited to calls to `render` which render file contents without a specified accept format. Impacted code in a controller looks something like this: ``` ruby class UserController < ApplicationController def index render file: "#{Rails.root}/some/file" end end ``` Rendering templates as opposed to files is not impacted by this vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by specifying a format for file rendering, like this: ``` ruby class UserController < ApplicationController def index render file: "#{Rails.root}/some/file", formats: [:html] end end ``` In summary, impacted calls to `render` look like this: ``` render file: "#{Rails.root}/some/file" ``` The vulnerability can be mitigated by changing to this: ``` render file: "#{Rails.root}/some/file", formats: [:html] ``` Other calls to `render` are not impacted. Alternatively, the following monkey patch can be applied in an initializer: ``` ruby $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub
4.2.11.1
Affected by 5 other vulnerabilities.
5.0.0.beta1
Affected by 7 other vulnerabilities.
5.0.7.2
Affected by 4 other vulnerabilities.
5.1.0.beta1
Affected by 5 other vulnerabilities.
5.1.6.2
Affected by 5 other vulnerabilities.
5.2.0.beta1
Affected by 5 other vulnerabilities.
5.2.2.1
Affected by 5 other vulnerabilities.
6.0.0.beta1
Affected by 3 other vulnerabilities.
VCID-c8b5-d83n-nuhw
Aliases:
CVE-2019-5419
GHSA-m63j-wh5w-c252
Allocation of Resources Without Limits or Throttling There is a possible denial of service vulnerability in Action View (Rails) where specially crafted accept headers can cause action view to consume % cpu and make the server unresponsive.
4.2.11.1
Affected by 5 other vulnerabilities.
5.0.7.2
Affected by 4 other vulnerabilities.
5.1.6.2
Affected by 5 other vulnerabilities.
5.2.2.1
Affected by 5 other vulnerabilities.
6.0.0.beta3
Affected by 2 other vulnerabilities.
VCID-g9t2-g33e-87fe
Aliases:
GHSA-2pwf-xwr3-hp55
Moderate severity vulnerability that affects actionview Withdrawn, accidental duplicate publish. Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
4.1.14.2
Affected by 9 other vulnerabilities.
VCID-v3r3-bwp5-a3bn
Aliases:
CVE-2016-0752
GHSA-xrr4-p6fq-hjg7
Path Traversal The Rails gem allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a `..` in a pathname.
4.1.14.1
Affected by 11 other vulnerabilities.
4.2.5.1
Affected by 9 other vulnerabilities.
VCID-z1jv-4ga2-7kd1
Aliases:
CVE-2016-2097
GHSA-vx9j-46rh-fqr8
Possible Information Leak Vulnerability Applications that pass unverified user input to the `render` method in a controller may be vulnerable to an information leak vulnerability. Impacted code will look something like this: ``` def index; render params[:id]; end ``` Carefully crafted requests can cause the above code to render files from unexpected places like outside the application's view directory, and can possibly escalate this to a remote code execution attack.
4.1.14.2
Affected by 9 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T15:57:21.779294+00:00 GHSA Importer Affected by VCID-8dad-dvat-1fg4 https://github.com/advisories/GHSA-86g5-2wh3-gc9j 38.0.0
2026-04-01T15:57:21.538214+00:00 GHSA Importer Affected by VCID-c8b5-d83n-nuhw https://github.com/advisories/GHSA-m63j-wh5w-c252 38.0.0
2026-04-01T15:56:36.587333+00:00 GHSA Importer Affected by VCID-g9t2-g33e-87fe https://github.com/advisories/GHSA-2pwf-xwr3-hp55 38.0.0
2026-04-01T15:56:12.164401+00:00 GHSA Importer Affected by VCID-z1jv-4ga2-7kd1 https://github.com/advisories/GHSA-vx9j-46rh-fqr8 38.0.0
2026-04-01T15:56:11.908309+00:00 GHSA Importer Affected by VCID-v3r3-bwp5-a3bn https://github.com/advisories/GHSA-xrr4-p6fq-hjg7 38.0.0
2026-04-01T15:56:11.709508+00:00 GHSA Importer Affected by VCID-86jq-2md2-d7ah https://github.com/advisories/GHSA-pc3m-v286-2jwj 38.0.0
2026-04-01T12:48:21.019822+00:00 GitLab Importer Affected by VCID-8dad-dvat-1fg4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionview/CVE-2019-5418.yml 38.0.0
2026-04-01T12:47:26.700232+00:00 GitLab Importer Affected by VCID-v3r3-bwp5-a3bn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionview/CVE-2016-0752.yml 38.0.0