Impact
Rails Action View provides helpers for generating HTML. When a blank string is supplied as an attribute name, the escaping logic is bypassed, producing malformed markup. A malicious attribute value can be interpreted by the browser as a separate attribute, enabling execution of injected scripts. This flaw is identified as a classic XSS weakness (CWE‑79).
Affected Systems
Ruby on Rails applications that use the ActionView component and allow users to supply custom HTML attributes are affected. All Rails 7.2 releases prior to 7.2.3.1, 8.0 releases prior to 8.0.4.1, and 8.1 releases prior to 8.1.2.1 are vulnerable.
Risk and Exploitability
The CVSS score is 2.3, reflecting low severity, and the vulnerability is not currently listed in the CISA KEV catalog. EPSS data is not available. The risk is primarily limited to applications that permit user‑defined attribute names; the attack can be carried out by sending a crafted HTTP request that causes a view to render a tag with an empty attribute name and an attacker‑controlled value. The likelihood of exploitation is inferred to be low, but the impact can be significant if the affected application exposes user input directly to view rendering.
OpenCVE Enrichment
Github GHSA