CVE-2026-34830

EUVD-2026-18390
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 14%
Affected Products (NVD)
VendorProductVersion
rackrack
𝑥
< 2.2.23
rackrack
3.0.0 ≤
𝑥
< 3.1.21
rackrack
3.2.0 ≤
𝑥
< 3.2.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-rack
bookworm
vulnerable
bookworm (security)
vulnerable
bullseye
vulnerable
bullseye (security)
vulnerable
forky
3.2.6-2
fixed
sid
3.2.6-2
fixed
trixie
vulnerable
trixie (security)
vulnerable
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
rmt-server
suse enterprise sap 15 SP7
2.27-150700.3.20.1
fixed
suse enterprise server 15 SP4
2.27-150400.3.54.1
fixed
suse enterprise server 15 SP7
2.27-150700.3.20.1
fixed
rmt-server-config
suse enterprise sap 15 SP7
2.27-150700.3.20.1
fixed
suse enterprise server 15 SP4
2.27-150400.3.54.1
fixed
suse enterprise server 15 SP7
2.27-150700.3.20.1
fixed
rmt-server-pubcloud
suse enterprise server 15 SP4
2.27-150400.3.54.1
fixed