Description
Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9.
Published: 2026-03-31
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A vulnerability was found in Ruby LSP, an implementation of the language server protocol for Ruby. The rubyLsp.branch VS Code workspace setting was interpolated into a generated Gemfile without proper sanitization. If a malicious .vscode/settings.json file is present in a project, opening that workspace can cause arbitrary Ruby code to be executed, giving an attacker full control of the user’s environment. This weakness is identified as CWE-94: Improper Control of Generation of Code or Logic.

Affected Systems

The issue affects Shopify’s Ruby LSP implementation. Versions prior to Shopify.ruby-lsp 0.10.2 and ruby-lsp 0.26.9 are vulnerable. The product is named Shopify.ruby-lsp for the repository Shopify/ruby-lsp. Users running the older versions should consider updating. No other vendors or product versions were listed as affected.

Risk and Exploitability

The CVSS base score of 7.1 indicates a high severity, and the vulnerability is classified as a local risk that requires the user to open a compromised workspace. The EPSS score is not available, and the vulnerability is not in the CISA KEV catalog. Because the exploit vector requires a malicious settings file in the project, an attacker would need to gain access to a developer’s filesystem or supply a malicious project, which limits the scope but still poses a significant threat to developers who open third‑party projects. Prompt patching is recommended to mitigate this risk.

Generated by OpenCVE AI on March 31, 2026 at 05:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch by upgrading to Shopify.ruby-lsp 0.10.2 or ruby-lsp 0.26.9.
  • If patching is not immediately possible, avoid opening untrusted projects or remove malicious .vscode/settings.json files before using the workspace.
  • Verify that your Ruby LSP installation is up to date and regularly check Shopify’s release notes and security advisories for further updates.

Generated by OpenCVE AI on March 31, 2026 at 05:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c4r5-fxqw-vh93 Ruby LSP has arbitrary code execution through branch setting
History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Shopify
Shopify ruby-lsp
Shopify shopify.ruby-lsp
Vendors & Products Shopify
Shopify ruby-lsp
Shopify shopify.ruby-lsp

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9.
Title Ruby LSP has arbitrary code execution through branch setting
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Shopify Ruby-lsp Shopify.ruby-lsp
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T14:51:58.711Z

Reserved: 2026-03-25T16:21:40.866Z

Link: CVE-2026-34060

cve-icon Vulnrichment

Updated: 2026-04-02T14:51:50.959Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T03:15:58.773

Modified: 2026-04-02T15:16:41.003

Link: CVE-2026-34060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:39:36Z

Weaknesses