CVE-2024-0241
Ruby vulnerability analysis and mitigation

Overview

CVE-2024-0241 affects encoded_id-rails versions before 1.0.0.beta2, exposing an uncontrolled resource consumption vulnerability. The vulnerability was discovered in October 2023 and allows a remote and unauthenticated attacker to cause a denial of service condition by sending an HTTP request with an extremely long "id" parameter (NVD, GitHub Advisory).

Technical details

The vulnerability stems from insufficient validation of encoded ID lengths in HTTP requests. Due to the performance characteristics of the hashids implementation, processing extremely long encoded IDs consumes significant CPU resources and can allocate over 200MB of intermediate objects. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (GitHub Advisory).

Impact

When exploited, this vulnerability can lead to a denial of service condition by consuming excessive server resources. The processing of maliciously crafted long IDs can cause significant CPU utilization and memory allocation, potentially affecting the availability of the application (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.0.0.beta2, which introduces a new option to limit the length of IDs that can be decoded. Users are advised to upgrade to this version or later. Future releases will also improve performance and significantly reduce allocations in the underlying hashids implementation (GitHub Advisory, GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68271CRITICAL10
  • RubyRuby
  • openc3
NoYesJan 13, 2026
GHSA-5qw5-wf2q-f538HIGH8.8
  • RubyRuby
  • activerecord-jdbc-adapter
NoYesJan 16, 2026
CVE-2026-22589HIGH7.5
  • RubyRuby
  • spree_core
NoYesJan 10, 2026
GHSA-mpwp-4h2m-765cMEDIUM6.6
  • RubyRuby
  • activejob
NoYesJan 16, 2026
CVE-2026-22588MEDIUM6.5
  • RubyRuby
  • spree_api
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management