Description
Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.
Published: 2026-04-02
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Header injection in HTTP responses
Action: Patch
AI Analysis

Impact

Rack, a Ruby web server interface, contains an issue in its multipart parsing logic from version 3.2.0 through 3.2.5. The parser fails to remove folded line breaks (obs-fold) when unfolding multipart headers, causing the CRLF characters to remain embedded in parsed values such as filename or name. If these parsed values are later used in HTTP response headers, an attacker can inject arbitrary headers or split the response. This vulnerability is classified as a header injection weakness (CWE‑93) and can potentially lead to response splitting, redirection, or other injection-based attacks. The impact is limited to the attacker's ability to influence HTTP response headers, which may affect confidentiality, integrity, or availability of the application but does not grant arbitrary code execution.

Affected Systems

The affected product is Rack, a modular Ruby web server interface, specifically versions 3.2.0 up to, but not including, 3.2.6. Versions prior to 3.2.0 are not affected, and the issue was fixed in 3.2.6. Users running any of the affected releases should verify which RC they are using and plan an update accordingly.

Risk and Exploitability

The CVSS score is 4.8, indicating moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a crafted multipart HTTP request containing folded header lines; the attacker must be able to submit such a request to the target application. The requirement to exploit the flaw is low to moderate, making it potentially exploitable in uncontrolled or poorly validated environments, but it does not provide privilege escalation beyond the application's current context.

Generated by OpenCVE AI on April 2, 2026 at 21:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Rack patch v3.2.6 or later
  • Verify that your Rack installation is updated to a non‑affected version
  • If a patch is not yet available, monitor for official releases and deploy as soon as possible
  • Consider disabling or sanitizing application usage of multipart header values in HTTP responses to mitigate exposure

Generated by OpenCVE AI on April 2, 2026 at 21:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rx22-g9mx-qrhv Rack's improper unfolding of folded multipart headers preserves CRLF in parsed parameter values
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rack
Rack rack
Vendors & Products Rack
Rack rack

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.
Title Rack: Header injection in multipart requests
Weaknesses CWE-93
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T18:13:06.632Z

Reserved: 2026-02-16T22:20:28.612Z

Link: CVE-2026-26962

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-02T18:16:26.773

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-26962

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:11Z

Weaknesses