CVE-2026-33635
March 26, 2026
iCalendar is a Ruby library for dealing with iCalendar files in the iCalendar format defined by RFC-5545. Starting in version 2.0.0 and prior to version 2.12.2, .ics serialization does not properly sanitize URI property values, enabling ICS injection through attacker-controlled input, adding arbitrary calendar lines to the output. "Icalendar::Values::Uri" falls back to the raw input string when "URI.parse" fails and later serializes it with "value.to_s" without removing or escaping "\r" or "\n" characters. That value is embedded directly into the final ICS line by the normal serializer, so a payload containing CRLF can terminate the original property and create a new ICS property or component. (It looks like you can inject via url, source, image, organizer, attach, attendee, conference, tzurl because of this). Applications that generate ".ics" files from partially untrusted metadata are impacted. As a result, downstream calendar clients or importers may process attacker-supplied content as if it were legitimate event data, such as added attendees, modified URLs, alarms, or other calendar fields. Version 2.12.2 contains a patch for the issue.
Affected Packages
https://github.com/icalendar/icalendar.git (GITHUB):
Affected version(s) >=v1.1.1 <v2.12.2Fix Suggestion:
Update to version v2.12.2https://github.com/icalendar/icalendar.git (GITHUB):
Affected version(s) >=v1.1.1 <v2.12.2Fix Suggestion:
Update to version v2.12.2https://github.com/icalendar/icalendar.git (GITHUB):
Affected version(s) >=v1.1.1 <v2.12.2Fix Suggestion:
Update to version v2.12.2icalendar (RUBY):
Affected version(s) >=2.0.0 <2.12.2Fix Suggestion:
Update to version 2.12.2icalendar (RUBY):
Affected version(s) >=2.0.0 <2.12.2Fix Suggestion:
Update to version 2.12.2icalendar (RUBY):
Affected version(s) >=2.0.0 <2.12.2Fix Suggestion:
Update to version 2.12.2Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of CRLF Sequences ('CRLF Injection')
EPSS
Base Score:
0.03