CVE-2026-39324

CRITICAL

Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization

Title source: cna

Description

Rack::Session is a session management implementation for Rack. From 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access. This vulnerability is fixed in 2.1.2.

Exploits (1)

nomisec WORKING POC
by sm1ee · poc
https://github.com/sm1ee/CVE-2026-39324

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 13.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-287 CWE-345 CWE-502 CWE-565
Status published
Products (3)
rack/rack-session 2.0.0 - 2.1.2
rack/rack-session >= 2.0.0, < 2.1.2
rubygems/rack-session 2.0.0 - 2.1.2RubyGems
Published Apr 07, 2026
Tracked Since Apr 08, 2026