VYPR
Medium severity6.1OSV Advisory· Published Jun 3, 2024· Updated Apr 15, 2026

CVE-2024-37031

CVE-2024-37031

Description

The Active Admin (aka activeadmin) framework before 3.2.2 for Ruby on Rails allows stored XSS in certain situations where users can create entities (to be later edited in forms) with arbitrary names, aka a "dynamic form legends" issue. 4.0.0.beta7 is also a fixed version.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Active Admin (activeadmin) before 3.2.2 has a stored XSS vulnerability via arbitrary entity names used as dynamic form legends.

The Active Admin (activeadmin) framework for Ruby on Rails, prior to version 3.2.2, contains a stored cross-site scripting (XSS) vulnerability in its dynamic form legends functionality. The issue arises when users with the ability to create entities (such as resources or records) can supply arbitrary names that are later rendered as form legends without proper escaping. This allows an attacker to inject malicious HTML or JavaScript into the page [1][2].

Exploitation requires that an attacker has the ability to create or edit entities within the Active Admin interface. The injected payload is stored on the server and subsequently executed in the browser of any administrator or user who views the form containing the malicious legend. No additional authentication bypass is needed beyond the standard privileges required to create or edit entities, making it a targeted attack against users with higher-level access [3].

The impact of successful exploitation is a stored XSS attack, which could lead to session hijacking, defacement, or theft of sensitive information within the administrative interface. The vulnerability is rated Medium (CVSS 6.1) due to the requirement that the attacker must have an account with entity creation permissions [1].

Version 3.2.2 of the activeadmin gem fixes the issue by escaping the legend output. The fix was backported to the 3-0-stable branch and is also available in the 4.0.0.beta7 release. Users are strongly advised to upgrade to either of these patched versions [2][3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
activeadminRubyGems
< 3.2.23.2.2
activeadminRubyGems
>= 4.0.0.beta1, < 4.0.0.beta74.0.0.beta7

Affected products

1

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.