Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c4r5-fxqw-vh93 | Ruby LSP has arbitrary code execution through branch setting |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shopify
Shopify ruby-lsp Shopify shopify.ruby-lsp |
|
| Vendors & Products |
Shopify
Shopify ruby-lsp Shopify shopify.ruby-lsp |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9. | |
| Title | Ruby LSP has arbitrary code execution through branch setting | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T14:51:58.711Z
Reserved: 2026-03-25T16:21:40.866Z
Link: CVE-2026-34060
Updated: 2026-04-02T14:51:50.959Z
Status : Awaiting Analysis
Published: 2026-03-31T03:15:58.773
Modified: 2026-04-02T15:16:41.003
Link: CVE-2026-34060
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:39:36Z
Github GHSA