Race Condition Affecting devise package, versions <5.0.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-DEVISE-15678508
  • published18 Mar 2026
  • disclosed17 Mar 2026
  • creditGrant Cox,James Kettle

Introduced: 17 Mar 2026

NewCVE-2026-32700  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade devise to version 5.0.3 or higher.

Overview

devise is a flexible authentication solution for Rails with Warden.

Affected versions of this package are vulnerable to Race Condition in the Confirmable module, when the reconfirmable option is enabled (which it is by default). An attacker can confirm an email address they don't own by sending two concurrent "change email" requests, causing a desynchronization between the confirmation_token and unconfirmed_email fields.

Workaround

This vulnerability can be avoided by overriding the method responsible for postponing email changes in the application's user model to ensure unconfirmed_email is persisted, or by manually setting changed_attributes["unconfirmed_email"] = nil for Mongoid-based applications.

CVSS Base Scores

version 4.0
version 3.1