CVE-2025-32441
Ruby vulnerability analysis and mitigation

Overview

Rack, a modular Ruby web server interface, contains a vulnerability in versions prior to 2.2.14 affecting the Rack::Session::Pool middleware. The vulnerability allows simultaneous rack requests to restore a deleted rack session, enabling an unauthenticated user to occupy that session. The issue was discovered and disclosed on May 7, 2025, and affects the session management functionality of the Rack framework (GitHub Advisory).

Technical details

The vulnerability stems from a race condition in the Rack session middleware's handling of session data. The middleware prepares the session at the beginning of a request and saves it back to the store with possible changes applied by the host rack application. This implementation makes sessions susceptible to race conditions during concurrent rack requests. The vulnerability has been assigned a CVSS v3.1 score of 4.2 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network accessibility with high attack complexity and low privileges required (GitHub Advisory).

Impact

If an attacker can acquire a session cookie, they can potentially restore a deleted session by triggering a long-running request adjacent to a user's logout action. This allows the attacker to maintain illicit access to the session even after the legitimate user has attempted to logout, compromising session security and potentially leading to unauthorized access (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to update to Rack version 2.2.14 or later. Alternative workarounds include: 1) Implementing atomic session invalidation by marking sessions as logged out using a logged_out flag instead of deleting them, and checking this flag on every request, or 2) Creating a custom session store that tracks session invalidation timestamps and refuses to accept session data if the session was invalidated after the request began (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management