Search for packages
Package details: pkg:gem/cgi@0.3.5
purl pkg:gem/cgi@0.3.5
Next non-vulnerable version 0.3.5.1
Latest non-vulnerable version 0.4.2
Risk 3.4
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-ey82-nbah-9bfr
Aliases:
CVE-2025-27219
GHSA-gh9q-2xrm-x6qv
CGI has Denial of Service (DoS) potential in Cookie.parse There is a possibility for DoS by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27219. We recommend upgrading the cgi gem. ## Details CGI::Cookie.parse took super-linear time to parse a cookie string in some cases. Feeding a maliciously crafted cookie string into the method could lead to a Denial of Service. Please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to lio346 for discovering this issue. Also thanks to mame for fixing this vulnerability.
0.3.5.1
Affected by 0 other vulnerabilities.
0.3.7
Affected by 0 other vulnerabilities.
0.4.2
Affected by 0 other vulnerabilities.
VCID-gjq7-jc2d-uudy
Aliases:
CVE-2025-27220
GHSA-mhwm-jh88-3gjf
CGI has Regular Expression Denial of Service (ReDoS) potential in Util#escapeElement There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem. ## Details The regular expression used in `CGI::Util#escapeElement` is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption. This vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to svalkanov for discovering this issue. Also thanks to nobu for fixing this vulnerability.
0.3.5.1
Affected by 0 other vulnerabilities.
0.3.7
Affected by 0 other vulnerabilities.
0.4.2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-2yge-cajg-eke7 The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object. CVE-2021-33621
GHSA-vc47-6rqg-c7f5

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-04T13:56:47.603221+00:00 GitLab Importer Fixing VCID-2yge-cajg-eke7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/cgi/CVE-2021-33621.yml 37.0.0
2025-07-03T19:22:06.660077+00:00 GitLab Importer Affected by VCID-gjq7-jc2d-uudy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/cgi/CVE-2025-27220.yml 37.0.0
2025-07-03T19:22:06.067885+00:00 GitLab Importer Affected by VCID-ey82-nbah-9bfr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/cgi/CVE-2025-27219.yml 37.0.0
2025-07-01T14:34:01.140781+00:00 GHSA Importer Fixing VCID-2yge-cajg-eke7 https://github.com/advisories/GHSA-vc47-6rqg-c7f5 36.1.3
2025-07-01T12:25:10.746464+00:00 GithubOSV Importer Fixing VCID-2yge-cajg-eke7 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-vc47-6rqg-c7f5/GHSA-vc47-6rqg-c7f5.json 36.1.3