CVE-2025-49007

Regular Expression Denial of Service
Affects
Rack
in
Rails
No items found.
Versions
>=3.1.0 <3.1.16
Exclamation circle icon
Patch Available

This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs

Overview

Rack is a modular Ruby web server interface.

A Regular expression Denial of Service (ReDoS) vulnerability (CVE-2025-49007) has been identified in Rack, which allows attackers to monopolize resources when parsing the Content-Disposition header, effectively causing a denial of service of the application. This is very similar to the previous security issue CVE-2022-44571.

Per OWASP: The Regular expression Denial of Service (ReDoS) is a Denial of Service attack that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression (Regex) to enter these extreme situations and then hang for a very long time.

This affects Rack versions greater than or equal to 3.1.0 and less than 3.1.16.

Details

Module Info

Vulnerability Info

This Medium-severity vulnerability is found in the rack module in versions greater than or equal to 3.1.0 and less than 3.1.16.

A carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.

Mitigation

OSS Users

Upgrade to Rack version 3.1.16 where the issue is fixed. If an upgrade is not possible, consider using a commercial support partner like HeroDevs for post EOL support.

NES Customers

Upgrade to Rack versions 1.4.7.24, 1.6.13.22 or 2.2.17.10 where the issue is fixed.

For customers making use of Rails v5 or v6 - you will also need to update your version of Rails to 5.2.8.32 or 6.1.7.28 respectively to accommodate the Rack version bump.

Credits

scyoon (finder)

Vulnerability Details
ID
CVE-2025-49007
PROJECT Affected
Rack
Versions Affected
>=3.1.0 <3.1.16
Published date
June 26, 2025
≈ Fix date
June 6, 2025
Severity
Level
CVSS Assessment
Low
>=0 <4
Medium
>=4 <6
High
>=6 <8
Critical
>=8 <10
Medium
Category
Regular Expression Denial of Service
Sign up for the latest vulnerability alerts fixed in
Ruby on Rails NES
Rss feed icon
Subscribe via RSS
or
Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.