Description
Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." using repeated String#index searches combined with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear processing. An unauthenticated attacker can send a crafted multipart/form-data request containing many parts with long backslash-escaped parameter values to trigger excessive CPU usage during multipart parsing. This results in a denial of service condition in Rack applications that accept multipart form data. This issue has been patched in versions 3.1.21 and 3.2.6.
Published: 2026-04-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service through excessive CPU consumption
Action: Apply Patch
AI Analysis

Impact

Rack, a modular Ruby web server interface, has a flaw in its multipart form data parser that allows an attacker to trigger extreme CPU usage. The vulnerability originates from repeated string search operations performed on quoted multipart parameters, creating a super‑linear processing time when many backslash‑escaped values are present. By sending a crafted multipart/form‑data request containing numerous parts with long escape‑heavy values, an unauthenticated attacker can force the parser to consume disproportionate CPU resources, effectively denying service to legitimate users.

Affected Systems

The affected product is Rack, spanning versions from 3.0.0.beta1 up to just before 3.1.21, and from 3.2.0 up to just before 3.2.6. Ruby applications that rely on any of these vulnerable releases are susceptible to the denial‑of‑service condition unless they have been upgraded beyond these version ranges.

Risk and Exploitability

The CVSS score of 7.5 reflects a high severity, though no EPSS data is available and the issue is not listed in the CISA KEV catalog. The attack vector is remote and unauthenticated, requiring only the ability to send HTTP requests. Successful exploitation does not reveal or corrupt data but can severely degrade application availability by monopolizing CPU resources. In the absence of publicly released exploit code, the risk is primarily determined by the presence of vulnerable Rack versions and the exposure of the application to the Internet.

Generated by OpenCVE AI on April 2, 2026 at 22:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Rack to version 3.1.21 or later, which includes the fix for this denial of service.
  • Verify that your application is using the updated Rack gem and that no older, vulnerable code remains.

Generated by OpenCVE AI on April 2, 2026 at 22:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v6x5-cg8r-vv6x Rack's multipart header parsing allows Denial of Service via escape-heavy quoted parameters
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rack
Rack rack
Vendors & Products Rack
Rack rack

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." using repeated String#index searches combined with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear processing. An unauthenticated attacker can send a crafted multipart/form-data request containing many parts with long backslash-escaped parameter values to trigger excessive CPU usage during multipart parsing. This results in a denial of service condition in Rack applications that accept multipart form data. This issue has been patched in versions 3.1.21 and 3.2.6.
Title Rack: Algorithmic-Complexity DoS in Rack::Multipart::Parser
Weaknesses CWE-400
CWE-407
CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T18:13:16.834Z

Reserved: 2026-03-30T20:52:53.283Z

Link: CVE-2026-34827

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-02T18:16:33.490

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34827

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:14Z

Weaknesses