Skip to content

Commit 6177cf5

Browse files
authored
GHSA SYNC: Added cvss_v3 field/value to 4 existing advisories (#1043)
* GHSA SYNC: Added cvss_v3 field/value to 4 existing advisories * Add CVSS v4 score and related URLs for CVE-2026-33658 * Update CVE-2026-23891.yml with CVSS v4 and URL Added CVSS v4 score and related URL for CVE-2026-23891. * Update CVE-2025-61594.yml with CVSS v4 and URL Added CVSS v4 score and related URL for CVE-2025-61594. * Update CVE-2025-61594 URL to GitHub advisory
1 parent 627e45a commit 6177cf5

4 files changed

Lines changed: 12 additions & 1 deletion

File tree

gems/activestorage/CVE-2026-33658.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,15 @@ description: |
1414
ranges in an HTTP Range header. A request with thousands of small
1515
ranges causes disproportionate CPU usage compared to a normal
1616
request for the same file, possibly resulting in a DoS vulnerability.
17+
cvss_v3: 6.5
18+
cvss_v4: 2.3
1719
patched_versions:
1820
- "~> 7.2.3, >= 7.2.3.1"
1921
- "~> 8.0.4, >= 8.0.4.1"
2022
- ">= 8.1.2.1"
2123
related:
2224
url:
25+
- https://nvd.nist.gov/vuln/detail/CVE-2026-33658
2326
- https://discuss.rubyonrails.org/t/cve-2026-33658-possible-dos-vulnerability-in-active-storage-proxy-mode-via-multi-range-requests/90906
2427
- https://rubyonrails.org/2026/3/23/Rails-Versions-7-2-3-1-8-0-4-1-and-8-1-2-1-have-been-released
2528
- https://github.com/rails/rails/commit/85ec5b1e00d3197d8c69a5e622e1b398a1b10b06.patch

gems/camaleon_cms/CVE-2026-1776.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ description: |
2020
access sensitive files such as /etc/passwd. This issue represents a
2121
bypass of the incomplete fix for CVE-2024-46987 and affects
2222
deployments using the AWS S3 storage backend.
23+
cvss_v3: 6.5
2324
cvss_v4: 6.0
2425
unaffected_versions:
2526
- "< 2.4.5.0"

gems/decidim-core/CVE-2026-23891.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,14 @@ description: |
3131
[octree](https://octree.ch/) and made by
3232
[Secu Labs](https://seculabs.ch/) against Decidim financed
3333
by the city of Lausanne (Switzerland).
34+
cvss_v3: 8.7
35+
cvss_v4: 9.3
3436
patched_versions:
3537
- "~> 0.30.5"
3638
- ">= 0.31.1"
3739
related:
3840
url:
41+
- https://nvd.nist.gov/vuln/detail/CVE-2026-23891
3942
- https://github.com/decidim/decidim/releases/tag/v0.31.1
4043
- https://github.com/decidim/decidim/releases/tag/v0.30.5
4144
- https://github.com/decidim/decidim/security/advisories/GHSA-fc46-r95f-hq7g

gems/uri/CVE-2025-61594.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
gem: uri
33
cve: 2025-61594
44
ghsa: j4pr-3wm6-xx2r
5-
url: https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594
5+
url: https://github.com/advisories/GHSA-j4pr-3wm6-xx2r
66
title: CVE-2025-61594 - URI Credential Leakage Bypass over CVE-2025-27221
77
date: 2025-10-07
88
description: |
@@ -29,14 +29,18 @@ description: |
2929
3030
Thanks to junfuchong (chongfujun) for discovering this issue.
3131
Also thanks to nobu for additional fixes of this vulnerability.
32+
cvss_v3: 7.5
33+
cvss_v4: 2.1
3234
patched_versions:
3335
- "~> 0.12.5"
3436
- "~> 0.13.3"
3537
- ">= 1.0.4"
3638
related:
3739
url:
40+
- https://nvd.nist.gov/vuln/detail/CVE-2025-61594
3841
- https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594
3942
- https://rubygems.org/gems/uri/versions/1.0.4
4043
- https://rubygems.org/gems/uri/versions/0.13.3
4144
- https://rubygems.org/gems/uri/versions/0.12.5
4245
- https://github.com/ruby/uri
46+
- https://github.com/advisories/GHSA-j4pr-3wm6-xx2r

0 commit comments

Comments
 (0)