Impact
Rack is a modular Ruby web server interface. The vulnerability allows Rack::Request to parse the Host header with a pattern that accepts characters not permitted in RFC-compliant hostnames, such as /, ?, #, and @. Applications that use simple prefix or suffix checks on the Host header can therefore be tricked into accepting forged host values, leading to host header poisoning that may affect link generation, redirects, or origin validation. The weakness is an example of host header injection (CWE-1286).
Affected Systems
The affected product is rack:rack. Versions from 3.0.0.beta1 up to, but not including, 3.1.21 and 3.2.0 up to, but not including, 3.2.6 are vulnerable. These patches are included in 3.1.21 and 3.2.6.
Risk and Exploitability
The CVSS score of 4.8 indicates a moderate severity, with an EPSS score below 1 % showing low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, so no large‑scale exploit data is available. Attackers would need to send a crafted HTTP request with a Host header containing invalid characters; the impact would be confined to the affected application’s request handling and any downstream redirects or URL generation.
OpenCVE Enrichment
Github GHSA
Ubuntu USN