CVE-2026-41316

CVE Details

Release Date:2026-04-24
Impact:Important What is this?

Description


ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other public methods that also evaluate `@src` via `eval()` were not given the same guard: `ERB#def_method`, `ERB#def_module`, and `ERB#def_class`. An attacker who can trigger `Marshal.load` on untrusted data in a Ruby application that has `erb` loaded can use `ERB#def_module` (zero-arg, default parameters) as a code execution sink, bypassing the `@_init` protection entirely. ERB 4.0.3.1, 4.0.4.1, 6.0.1.1, and 6.0.4 patch the issue.

See more information about CVE-2026-41316 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 8.1
Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Attack Vector: Network
Attack Complexity: High
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 10 (ruby) ELSA-2026-180652026-05-18
Oracle Linux version 9 (ruby) ELSA-2026-180302026-05-19
Oracle Linux version 9 (ruby) ELSA-2026-180392026-05-19
Oracle Linux version 9 (rubygem-mysql2) ELSA-2026-180302026-05-19
Oracle Linux version 9 (rubygem-pg) ELSA-2026-180302026-05-19


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete