TopVuln

High-risk vulnerability digests

CVE-2026-39324

  • CRITICAL

MINI-WV3H-9CCR-QR7F

Details

CVSS v3
9.8
CVSS v4
9.3
NVD published
2026-04-07 18:16:43
EPSS
<0.1% probability · 13.1th percentile — 2026-04-28
Affected versions
cpe:2.3:a:rack:rack-session:*:*:*:*:*:ruby:*:*
Summary
Rack::Session is a session management implementation for Rack. From 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access. This vulnerability is fixed in 2.1.2.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.