Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

rack — Vulnerabilities & Security Advisories 37

Browse all 37 CVE security advisories affecting rack. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Rack serves as a container orchestration platform, enabling developers to deploy and manage applications within isolated environments. Its architecture, which relies heavily on API interactions and web interfaces, has historically exposed it to a range of critical vulnerabilities. Among the 37 recorded CVEs, Remote Code Execution (RCE) and Cross-Site Scripting (XSS) represent the most prevalent threat vectors, often stemming from insufficient input validation in administrative endpoints. Additionally, privilege escalation flaws have allowed unauthorized users to gain elevated access, compromising the integrity of hosted workloads. While the platform offers robust isolation features, its complex dependency chain and frequent updates have occasionally introduced security gaps. These incidents highlight the necessity for rigorous patch management and strict access controls to mitigate risks associated with its containerized infrastructure.

Found 1 results / 37Clear Filters
High2026-04-03
`Forwarded` header semicolon injection enables `Host` and `Scheme` spoofing. · Advisory · rack/rack · GitHub
Medium2026-04-03
Greedy multipart boundary parsing can cause parser differentials and WAF bypass. · Advisory · rack/rack · GitHub
High2026-04-03
Improper unfolding of folded multipart headers preserves CRLF in parsed parameter values. · Advisory · rack/rack · GitHu
HighCVE-2024-281212026-04-03
Multipart byte range processing allows denial of service via excessive overlapping ranges. · Advisory · rack/rack · GitH
HighCVE-2023-31702026-04-03
`Rack::Static` prefix matching can expose unintended files under the static root. · Advisory · rack/rack · GitHub
High2026-04-03
`Rack::Request` accepts invalid Host characters, enabling host allowlist bypass. · Advisory · rack/rack · GitHub
HighGHSA-332f-2f92-673f2026-04-03
`Rack::Sendfile` header-based `X-Accel-Mapping` regex injection enables unauthorized `X-Accel-Redirect`. · Advisory · ra
Medium2026-04-03
`Rack::Static` `header_rules` bypass via URL-encoded path mismatch. · Advisory · rack/rack · GitHub
LowCVE-2020-267132026-04-03
Root directory disclosure via unescaped regex interpolation in `Rack::Directory`. · Advisory · rack/rack · GitHub
Medium2026-04-03
`Content-Length` mismatch in `Rack::Files` error responses. · Advisory · rack/rack · GitHub
High2026-04-03
Multipart parsing without `Content-Length` header allows unbounded chunked file uploads. · Advisory · rack/rack · GitHub
HighCVE-2024-348272026-04-03
Multipart header parsing allows denial of service via escape-heavy quoted parameters. · Advisory · rack/rack · GitHub
MediumCVE-2024-292412026-04-03
Quadratic complexity in `Rack::Utils.select_best_encoding` via wildcard `Accept-Encoding` header. · Advisory · rack/rack
HighCVE-2026-228602026-02-21
Directory Traversal via Rack:Directory · Advisory · rack/rack · GitHub
HighCVE-2025-619192025-10-11
Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion. · Advisory · rack/rack · GitHub
HighCVE-2025-598302025-09-26
Unsafe default in `Rack::QueryParser` allows params_limit bypass via semicolon-separated parameters. · Advisory · rack/r
HighCVE-2025-49072025-06-06
Fix ReDoS and consistency in multipart regexes · rack/rack@aed514d · GitHub
MediumCVE-2025-463362025-05-11
`Rack::Session::Pool` sessions can be restored after deletion · Advisory · rack/rack-session · GitHub
HighCVE-2025-467272025-05-09
Unbounded parameter parsing in `Rack::QueryParser` can lead to memory exhaustion · Advisory · rack/rack · GitHub

Showing up to 20 recent security advisories. View all →

This page lists every published CVE security advisory associated with rack. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.