All Rack CVEs — Complete Vulnerability History

Rack is the Ruby web server interface — the foundation that Rails, Sinatra, and every Ruby web app runs on. CVEs here affect all Ruby web applications.

Ruby 8M+ weekly downloads 5 CVEs total 1 CRITICAL 🔴 CISA KEV

Full CVE history

🔴 1 CVE on CISA KEV — actively exploited in real attacks

CVEYearSeverityDescriptionFix
CVE-2018-164712018MEDIUMXSS via PATH_INFO in Rack::DirectoryFixed 1.6.11
CVE-2020-81612020HIGHDirectory traversal in Rack::DirectoryFixed 2.1.3
CVE-2022-301222022HIGHDoS via crafted multipart bodyFixed 2.2.3
CVE-2022-301232022CRITICALShell command injection via newline in PATH_INFOFixed 2.2.3
CVE-2023-275302023🔴HIGHDoS via multipart body parsing — CISA KEVFixed 3.0.4

Current safe version: 3.0.11

# Before
gem 'rack', '2.2.2'
# After
gem 'rack', '3.0.11'

Then run: bundle install

Paste your manifest — see your exact versions against the full CVE history.

Scan with PackageFix →

Free · No signup · No CLI · Runs in your browser

Common questions

Does updating Rails update Rack?
Rails depends on Rack but with a loose version constraint. Specify rack explicitly in your Gemfile to pin to a safe version, or update Rails to a version that requires a safe Rack.
Is CVE-2022-30123 (shell injection) easy to exploit?
It requires the ability to inject a newline into PATH_INFO — possible if your routing doesn't validate URL paths. Update to 2.2.3+ immediately.

Related