Ad

CVE-2026-39324

CRITICAL CVSS 4.0: 9.3 EPSS 0.11%
Updated Apr 07, 2026
Rack
Parameter Value
CVSS 9.3 (CRITICAL)
Affected Versions before 2.1.2
Fixed In 2.1.2
Type CWE-345 (Insufficient Verification of Data), CWE-287 (Improper Authentication), CWE-565, CWE-502 (Deserialization of Untrusted Data)
Vendor Rack
Public PoC No

Rack::Session is a session management implementation for Rack. From 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie.

This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access. This vulnerability is fixed in 2.1.2.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0