Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-86jq-2md2-d7ah
Vulnerability ID VCID-86jq-2md2-d7ah
Aliases CVE-2016-6316
GHSA-pc3m-v286-2jwj
Summary Possible XSS Vulnerability in ActionView There is a possible XSS vulnerability in Action View. Text declared as `HTML safe` will not have quotes escaped when used as attribute values in tag helpers.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 6.1 http://rhn.redhat.com/errata/RHSA-2016-1855.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2016-1855.html
cvssv3.1 6.1 http://rhn.redhat.com/errata/RHSA-2016-1856.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2016-1856.html
cvssv3.1 6.1 http://rhn.redhat.com/errata/RHSA-2016-1857.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2016-1857.html
cvssv3.1 6.1 http://rhn.redhat.com/errata/RHSA-2016-1858.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2016-1858.html
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6316.json
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
epss 0.01626 https://api.first.org/data/v1/epss?cve=CVE-2016-6316
cvssv2 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-pc3m-v286-2jwj
cvssv3.1 6.1 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml
cvssv3 6.1 https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk
cvssv3.1 6.1 https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk
generic_textual MODERATE https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk
cvssv3.1 6.1 https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE
generic_textual MODERATE https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2016-6316
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-6316
cvssv3.1 6.1 https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430
generic_textual MODERATE https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430
cvssv3.1 6.1 https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316
generic_textual MODERATE https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316
cvssv3.1 6.1 http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released
generic_textual MODERATE http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released
cvssv3.1 6.1 http://www.debian.org/security/2016/dsa-3651
generic_textual MODERATE http://www.debian.org/security/2016/dsa-3651
cvssv3.1 6.1 http://www.openwall.com/lists/oss-security/2016/08/11/3
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2016/08/11/3
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2016-1855.html
http://rhn.redhat.com/errata/RHSA-2016-1856.html
http://rhn.redhat.com/errata/RHSA-2016-1857.html
http://rhn.redhat.com/errata/RHSA-2016-1858.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6316.json
https://api.first.org/data/v1/epss?cve=CVE-2016-6316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6316
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml
https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk
https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE
https://nvd.nist.gov/vuln/detail/CVE-2016-6316
https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430
https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316
http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released
http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/
http://www.debian.org/security/2016/dsa-3651
http://www.openwall.com/lists/oss-security/2016/08/11/3
1365008 https://bugzilla.redhat.com/show_bug.cgi?id=1365008
834155 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834155
GHSA-pc3m-v286-2jwj https://github.com/advisories/GHSA-pc3m-v286-2jwj
RHSA-2016:1855 https://access.redhat.com/errata/RHSA-2016:1855
RHSA-2016:1856 https://access.redhat.com/errata/RHSA-2016:1856
RHSA-2016:1857 https://access.redhat.com/errata/RHSA-2016:1857
RHSA-2016:1858 https://access.redhat.com/errata/RHSA-2016:1858
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-1855.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-1856.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-1857.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-1858.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6316.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-6316
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.debian.org/security/2016/dsa-3651
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.openwall.com/lists/oss-security/2016/08/11/3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.81795
EPSS Score 0.01626
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:47:05.909331+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2016-6316.yml 38.0.0