Fix Mechanize — CVE-2022-31033 HIGH
Fix CVE-2022-31033 (HIGH) in Mechanize for Ruby. Paste your Gemfile into PackageFix and get a patched version — no CLI, no signup. Credential leak via http redirect to different host.
⚠ Vulnerability
CVE-2022-31033 (HIGH) — credential leak via HTTP redirect to different host in Mechanize versions below 2.9.1.
Vulnerable Version — Gemfile
gem 'mechanize', '2.8.5'
Fixed Version — Gemfile
gem 'mechanize', '2.9.1'
✓ Fix
Update Mechanize to 2.9.1 or later. Run bundle install to apply. Verify with your ecosystem's audit tool after updating.
Paste your manifest — get back a fixed version with all CVEs patched in seconds.
Open PackageFix →No signup · No CLI · No GitHub connection · Runs 100% in your browser
CVE Details
| Field | Value |
|---|---|
| CVE ID | CVE-2022-31033 |
| Severity | HIGH |
| Package | Mechanize (Ruby) |
| Vulnerable versions | Below 2.9.1 |
| Safe version | 2.9.1 |
| CISA KEV | — |
| Description | Credential leak via http redirect to different host |
Frequently Asked Questions
What is CVE-2022-31033?
CVE-2022-31033 is a HIGH severity vulnerability in Mechanize (Ruby). It allows credential leak via HTTP redirect to different host. Update to version 2.9.1 or later to fix it.
How do I fix CVE-2022-31033 in Mechanize?
Update Mechanize to version 2.9.1 in your Gemfile. Run bundle install after updating to apply the fix.
Is CVE-2022-31033 being actively exploited?
Check the live CISA KEV catalog at packagefix.dev — PackageFix always reflects the current KEV status.
How do I check if I am affected by CVE-2022-31033?
Paste your Gemfile into PackageFix. If your installed version of Mechanize is below 2.9.1, you are affected. PackageFix shows the exact CVE ID and fix version.
What search queries does this page target?
This page covers: Mechanize CVE, mechanize credential leak, mechanize vulnerability.