Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-34060
March 28, 2026
Summary The "rubyLsp.branch" VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious ".vscode/settings.json". Other editors that support workspace setting that get automatically applied upon opening the editor and trusting the workspace are also impacted since the server is the component that performs the interpolation. Details The "branch" CLI argument passed to the "ruby-lsp" server was interpolated in the generated ".ruby-lsp/Gemfile" without sanitization. Editors that allow defining settings saved at the workspace level (e.g.: ".vscode/settings.json") that gets automatically applied open the possibility to craft a malicious repository that once opened and trusted in the editor would run arbitrary code. Impact Code execution with the privileges of the user who opens the malicious project. Ruby LSP assumes workspace code is trusted and so opening the editor on an untrusted workspace can lead to executing potentially dangerous code. Remediation The "rubyLsp.branch" setting has been removed entirely. VS Code extensions auto-update by default, so most users will receive the fix without action. Users who have disabled auto-updates should update to extension version >= 0.10.2. The "branch" CLI flag was also entirely removed from the "ruby-lsp" gem. For users that don't add "ruby-lsp" to their Gemfiles, the server should auto-update. Users with the "ruby-lsp" in the Gemfile and locked to a specific version should update to >= 0.26.9.
Affected Packages
ruby-lsp (RUBY):
Affected version(s) >=0.0.1 <0.26.9
Fix Suggestion:
Update to version 0.26.9
ruby-lsp (RUBY):
Affected version(s) >=0.0.1 <0.26.9
Fix Suggestion:
Update to version 0.26.9
ruby-lsp (RUBY):
Affected version(s) >=0.0.1 <0.26.9
Fix Suggestion:
Update to version 0.26.9
ruby-lsp (RUBY):
Affected version(s) >=0.0.1 <0.26.9
Fix Suggestion:
Update to version 0.26.9
ruby-lsp (RUBY):
Affected version(s) >=0.0.1 <0.26.9
Fix Suggestion:
Update to version 0.26.9
ruby-lsp (RUBY):
Affected version(s) >=0.0.1 <0.26.9
Fix Suggestion:
Update to version 0.26.9
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.1
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
ACTIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.8
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')