Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-g3rk-djae-pkeh
Vulnerability ID VCID-g3rk-djae-pkeh
Aliases CVE-2024-54133
GHSA-vfm5-rmrh-j26v
Summary Possible Content Security Policy bypass in Action Dispatch There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack. Impact ------ Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input. Credits ------- Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54133.json
epss 0.00122 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.00122 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-54133
cvssv3.1_qr LOW https://github.com/advisories/GHSA-vfm5-rmrh-j26v
cvssv4 2.3 https://github.com/rails/rails
generic_textual LOW https://github.com/rails/rails
cvssv4 2.3 https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49
generic_textual LOW https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49
ssvc Track https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49
cvssv4 2.3 https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a
generic_textual LOW https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a
ssvc Track https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a
cvssv4 2.3 https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542
generic_textual LOW https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542
ssvc Track https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542
cvssv4 2.3 https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d
generic_textual LOW https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d
ssvc Track https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d
cvssv3.1_qr LOW https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
cvssv4 2.3 https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
generic_textual LOW https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
ssvc Track https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
cvssv4 2.3 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml
generic_textual LOW https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml
cvssv4 2.3 https://nvd.nist.gov/vuln/detail/CVE-2024-54133
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2024-54133
cvssv4 2.3 https://security.netapp.com/advisory/ntap-20250306-0010
generic_textual LOW https://security.netapp.com/advisory/ntap-20250306-0010
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54133.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rails/rails
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:05:59Z/ Found at https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:05:59Z/ Found at https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:05:59Z/ Found at https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:05:59Z/ Found at https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:05:59Z/ Found at https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-54133
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Found at https://security.netapp.com/advisory/ntap-20250306-0010
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.31424
EPSS Score 0.00122
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:07.268568+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-vfm5-rmrh-j26v/GHSA-vfm5-rmrh-j26v.json 38.0.0