Anonymous Intelligence Signal

Devise v5 Security Update Patches Critical Race Condition in Email Confirmation (CVE-2026-32700)

human The Lab unverified 2026-03-25 20:27:20 Source: GitHub Issues

A critical security vulnerability in the widely-used Ruby authentication library Devise exposes applications to account takeover risks. The flaw, tracked as CVE-2026-32700, is a race condition within the Confirmable module that allows an attacker to confirm an email address they do not own. This directly impacts any Rails application using Devise with the default `reconfirmable` option, a standard configuration for handling email changes.

The vulnerability stems from a flaw in how concurrent email change requests are processed. By sending two such requests at the same time, an attacker can exploit the timing window to bypass ownership verification and successfully confirm an unauthorized email address. This grants them control over the account associated with the targeted email. The issue is present in versions prior to the newly released Devise v5.0.3, which contains the necessary patch.

The update from version 4.9.4 to 5.0.3 is now being pushed via dependency management tools like RenovateBot, signaling an urgent need for maintainers to merge the patch. Given Devise's foundational role in securing user sessions for countless Ruby on Rails applications, this vulnerability represents a significant supply-chain security risk. Failure to apply the update leaves user accounts across a vast ecosystem vulnerable to unauthorized access and takeover.