Exposure of Information Through Directory Listing Affecting rack package, versions <2.2.22>=3.0.0.beta1, <3.1.20>=3.2.0, <3.2.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-RACK-15307669
  • published18 Feb 2026
  • disclosed17 Feb 2026
  • creditMasamuneee

Introduced: 17 Feb 2026

NewCVE-2026-22860  (opens in a new tab)
CWE-548  (opens in a new tab)

How to fix?

Upgrade rack to version 2.2.22, 3.1.20, 3.2.5 or higher.

Overview

rack is a minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.

Affected versions of this package are vulnerable to Exposure of Information Through Directory Listing in Rack::Directory, which checks for presence in the root directory only by left-side string comparison. An attacker can list directories outside the intended root if the prefix of the target directory is exactly the name of the root directory. E.g. www_backup is exposed when www is intended.

References

CVSS Base Scores

version 4.0
version 3.1