Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-pb5f-g4uc-r7fp
Vulnerability ID VCID-pb5f-g4uc-r7fp
Aliases CVE-2016-0753
GHSA-543v-gj2c-r3ch
Summary Possible Input Validation Circumvention Code that uses Active Model based models (including Active Record models) and does not validate user input before passing it to the model can be subject to an attack where specially crafted input will cause the model to skip validations. Rails users using Strong Parameters are generally not impacted by this issue as they are encouraged to allow parameters and must specifically opt-out of input verification using the `permit!` method to allow mass assignment.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 5.3 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html
cvssv3.1 5.3 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
cvssv3.1 5.3 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html
cvssv3.1 5.3 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html
cvssv3.1 5.3 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html
cvssv3.1 5.3 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
cvssv3.1 5.3 http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
cvssv3.1 5.3 http://rhn.redhat.com/errata/RHSA-2016-0296.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2016-0296.html
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
epss 0.02328 https://api.first.org/data/v1/epss?cve=CVE-2016-0753
cvssv2 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-543v-gj2c-r3ch
cvssv3.1 5.3 https://github.com/rails/rails
generic_textual MODERATE https://github.com/rails/rails
cvssv3.1 5.3 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml
cvssv3 5.3 https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ
cvssv3.1 5.3 https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ
generic_textual MODERATE https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2016-0753
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2016-0753
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2016-0753
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-0753
cvssv3.1 5.3 https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816
generic_textual MODERATE https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816
cvssv3.1 5.3 https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247
generic_textual MODERATE https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247
cvssv3.1 5.3 https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ
generic_textual MODERATE https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ
cvssv3.1 5.3 http://www.debian.org/security/2016/dsa-3464
generic_textual MODERATE http://www.debian.org/security/2016/dsa-3464
cvssv3.1 5.3 http://www.openwall.com/lists/oss-security/2016/01/25/14
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2016/01/25/14
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
http://rhn.redhat.com/errata/RHSA-2016-0296.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0753.json
https://api.first.org/data/v1/epss?cve=CVE-2016-0753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0753
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/rails/rails
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml
https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ
https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ
https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816
https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247
https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ
http://www.debian.org/security/2016/dsa-3464
http://www.openwall.com/lists/oss-security/2016/01/25/14
http://www.securityfocus.com/bid/82247
http://www.securitytracker.com/id/1034816
1301973 https://bugzilla.redhat.com/show_bug.cgi?id=1301973
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
CVE-2016-0753 https://nvd.nist.gov/vuln/detail/CVE-2016-0753
GHSA-543v-gj2c-r3ch https://github.com/advisories/GHSA-543v-gj2c-r3ch
RHSA-2016:0296 https://access.redhat.com/errata/RHSA-2016:0296
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://rhn.redhat.com/errata/RHSA-2016-0296.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/rails/rails
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-0753
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-0753
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-0753
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://www.debian.org/security/2016/dsa-3464
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://www.openwall.com/lists/oss-security/2016/01/25/14
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.84748
EPSS Score 0.02328
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:47:00.672423+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/activemodel/CVE-2016-0753.yml 38.0.0