CVE-2026-34230

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*

History

16 Apr 2026, 17:27

Type Values Removed Values Added
First Time Rack rack
Rack
References () https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr - () https://github.com/rack/rack/security/advisories/GHSA-v569-hp3g-36wr - Vendor Advisory
CPE cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*

02 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 17:16

Updated : 2026-04-16 17:27


NVD link : CVE-2026-34230

Mitre link : CVE-2026-34230

CVE.ORG link : CVE-2026-34230


JSON object : View

Products Affected

rack

  • rack
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-407

Inefficient Algorithmic Complexity