Skip to content

Commit 35bcf75

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@e4d63d4
1 parent 1e55902 commit 35bcf75

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2026-23885 (alchemy_cms): AlchemyCMS - Authenticated Remote Code Execution
4+
(RCE) via eval injection in ResourcesHelper'
5+
comments: false
6+
categories:
7+
- alchemy_cms
8+
advisory:
9+
gem: alchemy_cms
10+
cve: 2026-23885
11+
ghsa: 2762-657x-v979
12+
url: https://github.com/AlchemyCMS/alchemy_cms/security/advisories/GHSA-2762-657x-v979
13+
title: AlchemyCMS - Authenticated Remote Code Execution (RCE) via eval injection
14+
in ResourcesHelper
15+
date: 2026-01-21
16+
description: |
17+
### Summary
18+
19+
A vulnerability was discovered during a manual security audit
20+
of the AlchemyCMS source code. The application uses the Ruby
21+
`eval()` function to dynamically execute a string provided by the
22+
`resource_handler.engine_name` attribute in
23+
`Alchemy::ResourcesHelper#resource_url_proxy`.
24+
25+
### Details
26+
27+
The vulnerability exists in `app/helpers/alchemy/resources_helper.rb`
28+
at line 28. The code explicitly bypasses security linting with
29+
`# rubocop:disable Security/Eval`, indicating that the use of a
30+
dangerous function was known but not properly mitigated.
31+
32+
Since `engine_name` is sourced from module definitions that can be
33+
influenced by administrative configurations, it allows an authenticated
34+
attacker to escape the Ruby sandbox and execute arbitrary system
35+
commands on the host OS.
36+
37+
But, for this attack to be possible local file access to the alchemy
38+
project or the source on a remote server is necessary in order to
39+
manipulate the module config file, though.
40+
cvss_v3: 6.6
41+
patched_versions:
42+
- "~> 7.4.12"
43+
- ">= 8.0.3"
44+
related:
45+
url:
46+
- https://nvd.nist.gov/vuln/detail/CVE-2026-23885
47+
- https://github.com/AlchemyCMS/alchemy_cms/security/advisories/GHSA-2762-657x-v979
48+
- https://github.com/AlchemyCMS/alchemy_cms/commit/55d03ec600fd9e07faae1138b923790028917d26
49+
- https://github.com/AlchemyCMS/alchemy_cms/commit/563c4ce45bf5813b7823bf3403ca1fc32cb769e7
50+
- https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v7.4.12
51+
- https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v8.0.3
52+
- https://github.com/advisories/GHSA-2762-657x-v979
53+
---

0 commit comments

Comments
 (0)