Impact
The vulnerability exists in the iCalendar Ruby library. Unsanitized URI property values allow injection of CRLF characters into the serialized .ics output. An attacker can embed malicious calendar lines, causing downstream clients to process unwanted event components such as additional attendees or alarms.
Affected Systems
Affected systems include any application that uses the iCalendar gem version 2.0.0 up to 2.12.2, especially those that generate .ics files from untrusted metadata.
Risk and Exploitability
The CVSS base score is 4.3, indicating moderate risk. Because the attack requires crafting a malicious iCalendar file and the victim must import or parse it, the likelihood of exploitation is moderate. The vulnerability is not listed in the KEV catalog. Deploying the patched version of the gem mitigates the risk entirely.
OpenCVE Enrichment
Github GHSA