Fix ActiveAdmin — CVE-2023-51763 HIGH

Fix CVE-2023-51763 (HIGH) in ActiveAdmin for Ruby. Paste your Gemfile into PackageFix and get a patched version — no CLI, no signup. Xss via admin interface filter parameters.

⚠ Vulnerability

CVE-2023-51763 (HIGH) — XSS via admin interface filter parameters in ActiveAdmin versions below 3.2.2.

Vulnerable Version — Gemfile

gem 'activeadmin', '2.14.0'

Fixed Version — Gemfile

gem 'activeadmin', '3.2.2'
✓ Fix

Update ActiveAdmin to 3.2.2 or later. Run bundle install to apply. Verify with your ecosystem's audit tool after updating.

Paste your manifest — get back a fixed version with all CVEs patched in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

CVE Details

FieldValue
CVE IDCVE-2023-51763
SeverityHIGH
PackageActiveAdmin (Ruby)
Vulnerable versionsBelow 3.2.2
Safe version3.2.2
CISA KEV
DescriptionXss via admin interface filter parameters

Frequently Asked Questions

What is CVE-2023-51763?
CVE-2023-51763 is a HIGH severity vulnerability in ActiveAdmin (Ruby). It allows XSS via admin interface filter parameters. Update to version 3.2.2 or later to fix it.
How do I fix CVE-2023-51763 in ActiveAdmin?
Update ActiveAdmin to version 3.2.2 in your Gemfile. Run bundle install after updating to apply the fix.
Is CVE-2023-51763 being actively exploited?
Check the live CISA KEV catalog at packagefix.dev — PackageFix always reflects the current KEV status.
How do I check if I am affected by CVE-2023-51763?
Paste your Gemfile into PackageFix. If your installed version of ActiveAdmin is below 3.2.2, you are affected. PackageFix shows the exact CVE ID and fix version.
What search queries does this page target?
This page covers: ActiveAdmin CVE, activeadmin XSS, activeadmin vulnerability.

Related Guides