-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| activerecord | rubygems | >= 7.0.0, <= 7.0.3 | 7.0.3.1 |
| activerecord | rubygems | >= 6.1.0, <= 6.1.6 | 6.1.6.1 |
| activerecord | rubygems | >= 6.0.0, <= 6.0.5 | 6.0.5.1 |
| activerecord | rubygems | <= 5.2.8 | 5.2.8.1 |
The vulnerability stems from the YAML deserialization approach in serialized columns. The commit 611990f shows the patched version replaced unsafe_load with safe_load. The original vulnerable implementation in yaml_column.rb directly used unsafe_load, which permits deserialization of potentially dangerous objects. This matches the CWE-502 (Deserialization of Untrusted Data) classification and the advisory's description of RCE risk through manipulated YAML data.
KEV Misses 88% of Exploited CVEs- Get the report