Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-24293
January 30, 2026
Active Storage allowed transformation methods potentially unsafe Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default. The default allowed list contains three methods allow for the circumvention of the safe defaults which enables potential command injection vulnerabilities in cases where arbitrary user supplied input is accepted as valid transformation methods or parameters. Impact ------ This vulnerability impacts applications that use Active Storage with the image_processing processing gem in addition to mini_magick as the image processor. Vulnerable code will look something similar to this: "<%= image_tag blob.variant(params[:t] => params[:v]) %>" Where the transformation method or its arguments are untrusted arbitrary input. All users running an affected release should either upgrade or use one of the workarounds immediately. Workarounds ----------- Consuming user supplied input for image transformation methods or their parameters is unsupported behavior and should be considered dangerous. Strict validation of user supplied methods and parameters should be performed as well as having a strong "ImageMagick security policy" (https://imagemagick.org/script/security-policy.php) deployed. Credits ------- Thank you "lio346" (https://hackerone.com/lio346) for reporting this!
Affected Packages
https://github.com/rails/rails.git (GITHUB):
Affected version(s) >=v7.2.0.beta1 <v7.2.2.2
Fix Suggestion:
Update to version v7.2.2.2
https://github.com/rails/rails.git (GITHUB):
Affected version(s) >=v8.0.0.alpha1 <v8.0.2.1
Fix Suggestion:
Update to version v8.0.2.1
https://github.com/rails/rails.git (GITHUB):
Affected version(s) >=v0.5.0 <v7.1.5.2
Fix Suggestion:
Update to version v7.1.5.2
activestorage (RUBY):
Affected version(s) >=8.0.0 <8.0.2.1
Fix Suggestion:
Update to version 8.0.2.1
activestorage (RUBY):
Affected version(s) >=5.2.0 <7.1.5.2
Fix Suggestion:
Update to version 7.1.5.2
activestorage (RUBY):
Affected version(s) >=7.2.0 <7.2.2.2
Fix Suggestion:
Update to version 7.2.2.2
Do you need more information?
Contact Us
CVSS v4
Base Score:
9.2
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
POC
CVSS v3
Base Score:
9.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')
Improper Neutralization of Special Elements used in a Command ('Command Injection')
EPSS
Base Score:
0.22