Description
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Published: 2026-04-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure and Denial of Service
Action: Immediate Patch
AI Analysis

Impact

Rack::Directory builds a regular expression by interpolating the configured root path. When that path contains regex metacharacters such as +, *, or ., the regex is malformed and prefix stripping fails. The generated directory listing may then expose the full filesystem path in the HTML output, and the malformed regex can trigger a denial‑of‑service condition by causing unexpected errors. This vulnerability is a form of improper input processing, reflected in the listed weaknesses.

Affected Systems

The vulnerability affects all releases of Rack prior to 2.2.23, 3.1.21, and 3.2.6 when the Rack::Directory middleware is used to browse directories. Applications that rely on earlier versions of Rack and configure a root path containing regex metacharacters are susceptible.

Risk and Exploitability

The CVSS score of 5.3 represents moderate severity, while the EPSS score below 1% suggests a low, though present, likelihood of exploitation. The issue is not documented in the KER catalog. An attacker can trigger the flaw through an unauthenticated HTTP request that causes Rack::Directory to process a root path with regex metacharacters, leading to information disclosure and potential service interruption. Evidence of a direct exploitation pathway is implied by the nature of the vulnerability, but no public exploit has been identified.

Generated by OpenCVE AI on April 4, 2026 at 04:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Rack to version 2.2.23 or newer (this includes 3.1.21 and 3.2.6) to apply the official patch.
  • If an upgrade is not immediately feasible, avoid using Rack::Directory with root paths that contain regex metacharacters until the patch can be applied.

Generated by OpenCVE AI on April 4, 2026 at 04:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7mqq-6cf9-v2qp Rack has a root directory disclosure via unescaped regex interpolation in Rack::Directory
History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-41
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rack
Rack rack
Vendors & Products Rack
Rack rack

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Title Rack: Rack::Directory info disclosure and DoS via unescaped regex interpolation
Weaknesses CWE-625
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T17:41:12.293Z

Reserved: 2026-03-30T19:17:10.225Z

Link: CVE-2026-34763

cve-icon Vulnrichment

Updated: 2026-04-02T17:41:07.802Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-02T17:16:24.723

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34763

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-02T16:43:42Z

Links: CVE-2026-34763 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:56:00Z

Weaknesses