Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24651 | Active Record logging vulnerable to ANSI escape injection |
Github GHSA |
GHSA-76r7-hhxj-r776 | Active Record logging vulnerable to ANSI escape injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Aug 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails rails |
|
| Vendors & Products |
Rails
Rails rails |
Thu, 14 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 13 Aug 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences. This issue has been patched in versions 7.1.5.2, 7.2.2.2, and 8.0.2.1. | |
| Title | Active Record logging vulnerable to ANSI escape injection | |
| Weaknesses | CWE-150 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-14T14:51:11.284Z
Reserved: 2025-08-08T21:55:07.963Z
Link: CVE-2025-55193
Updated: 2025-08-14T13:42:11.881Z
Status : Awaiting Analysis
Published: 2025-08-13T23:15:26.237
Modified: 2025-08-14T13:11:53.633
Link: CVE-2025-55193
OpenCVE Enrichment
Updated: 2025-08-14T12:50:36Z
EUVD
Github GHSA