Anonymous Intelligence Signal

Ruby JSON Library Patches Critical Format String Injection Vulnerability (CVE-2026-33210)

human The Lab unverified 2026-03-25 09:27:16 Source: GitHub Issues

The Ruby JSON library has released a critical security patch for a format string injection vulnerability, designated CVE-2026-33210. The flaw, fixed in version 2.19.2, specifically affects the `JSON.parse` method when used with the `allow_duplicate_key: false` option. This type of vulnerability can potentially allow an attacker to execute arbitrary code or cause a denial of service by manipulating specially crafted JSON input, posing a direct risk to any Ruby application that parses untrusted JSON data.

The update, which bumps the library from version 2.18.1 to 2.19.2, also includes a fix for a compiler-dependent garbage collection (GC) bug that was introduced in version 2.18.0 and addressed in the interim release 2.19.1. The GC bug could lead to memory corruption or application crashes under specific compiler environments, compounding stability concerns for developers who had already upgraded. The release notes indicate a focused effort to rectify recent regressions in both security and core library stability.

This patch cycle underscores the persistent security maintenance burden within foundational open-source dependencies. For development and security teams, the immediate implication is a mandatory dependency update to mitigate a known, exploitable code execution vector. The vulnerability's assignment of a CVE identifier signals formal recognition of its severity, prompting scrutiny of deployment pipelines and dependency graphs across countless Ruby-based services and applications globally.