Multipart Content Parsing Issue in Rack by Ruby
CVE-2026-26961
What is CVE-2026-26961?
The Rack library, utilized in Ruby web applications, contains a vulnerability related to how it handles multipart/form-data. Specifically, the Rack::Multipart::Parser incorrectly extracts the boundary parameter due to the usage of a greedy regular expression. In situations where multiple boundary parameters are present in the Content-Type header, the library selects the last boundary instead of the first. This behavior can be exploited in setups involving an upstream proxy, Web Application Firewall (WAF), or other intermediaries. If these intermediaries interpret the first boundary parameter, an attacker can craft multipart content that bypasses proper validation, allowing for the submission of an altered body structure compared to what was originally verified by the intermediary. The issue has been addressed in designated versions of Rack.
Affected Version(s)
rack < 2.2.23 < 2.2.23
rack >= 3.0.0.beta1, < 3.1.21 < 3.0.0.beta1, 3.1.21
rack >= 3.2.0, < 3.2.6 < 3.2.0, 3.2.6
