Ruby JSON is a JSON implementation for Ruby. From version 2.14.0 to before versions 2.15.2.1, 2.17.1.2, and 2.19.2, a format string injection vulnerability can lead to denial of service attacks or information disclosure, when the allow_duplicate_key: false parsing option is used to parse user supplied documents. This issue has been patched in versions 2.15.2.1, 2.17.1.2, and 2.19.2.
References
| Link | Resource |
|---|---|
| https://github.com/ruby/json/security/advisories/GHSA-3m6g-2423-7cp3 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Mar 2026, 21:25
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ruby-lang json
Ruby-lang |
|
| CPE | cpe:2.3:a:ruby-lang:json:*:*:*:*:*:ruby:*:* | |
| References | () https://github.com/ruby/json/security/advisories/GHSA-3m6g-2423-7cp3 - Mitigation, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| Summary |
|
20 Mar 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 23:16
Updated : 2026-03-27 21:25
NVD link : CVE-2026-33210
Mitre link : CVE-2026-33210
CVE.ORG link : CVE-2026-33210
JSON object : View
Products Affected
ruby-lang
- json
CWE
CWE-134
Use of Externally-Controlled Format String
