-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the unescaped interpolation of the 'current_queue' parameter (from params[:id]) in the form action URL. The original code in queues.erb used '<%=u "/queues/#{current_queue}/remove" %>' without proper HTML escaping, enabling XSS when malicious queue names containing script payloads were supplied. The patch added escape_html() to sanitize this user-controlled input. The direct correlation between the vulnerability description, CWE-79 classification, and the specific code change in the commit confirms this as the vulnerable code path.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| resque | rubygems | < 2.6.0 | 2.6.0 |
Ongoing coverage of React2Shell