{"id":"CVE-2026-33176","summary":"Rails Active Support has a possible DoS vulnerability in its number helpers","details":"Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Support number helpers accept strings containing scientific notation (e.g. `1e10000`), which `BigDecimal` expands into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.","aliases":["GHSA-2j26-frm8-cmj9"],"modified":"2026-05-18T05:59:58.092342606Z","published":"2026-03-23T23:29:27.933Z","related":["CGA-6p82-p5j2-744w"],"database_specific":{"cwe_ids":["CWE-400","CWE-770"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33176.json"},"references":[{"type":"WEB","url":"https://github.com/rails/rails/releases/tag/v7.2.3.1"},{"type":"WEB","url":"https://github.com/rails/rails/releases/tag/v8.0.4.1"},{"type":"WEB","url":"https://github.com/rails/rails/releases/tag/v8.1.2.1"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33176.json"},{"type":"ADVISORY","url":"https://github.com/rails/rails/security/advisories/GHSA-2j26-frm8-cmj9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33176"},{"type":"FIX","url":"https://github.com/rails/rails/commit/19dbab51ca086a657bb86458042bc44314916bcb"},{"type":"FIX","url":"https://github.com/rails/rails/commit/ebd6be18120d1136511eb516338e27af25ac0a1a"},{"type":"FIX","url":"https://github.com/rails/rails/commit/ee2c59e730e5b8faed502cd2c573109df093f856"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rails/rails","events":[{"introduced":"72bc36fb47aa3a9b10149ecefc1f344d7b028d79"},{"fixed":"ba76fca032a66f3716ca8a661c9ddb006acaf885"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-33176.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"}]}