PatchSiren cyber security CVE debrief
CVE-2022-32224 Activerecord Project CVE debrief
CVE-2022-32224 is a critical vulnerability in Active Record YAML serialized columns that can escalate to remote code execution if an attacker can manipulate data in the database. NVD lists the issue as CVSS 3.1 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), with affected versions including Active Record < 7.0.3.1, < 6.1.6.1, < 6.0.5.1, and < 5.2.8.1.
- Vendor
- Activerecord Project
- Product
- CVE-2022-32224
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2022-12-05
- Original CVE updated
- 2026-05-11
- Advisory published
- 2022-12-05
- Advisory updated
- 2026-05-11
Who should care
Teams running Ruby applications that use Active Record YAML serialized columns should treat this as urgent, especially where an attacker could write or modify database content through SQL injection or another data-write path.
Technical summary
The vulnerability is described as a possible escalation to RCE when Active Record uses YAML serialized columns. The provided corpus maps the weakness to CWE-502 and indicates vulnerable version ranges for Active Record 5.2, 6.0, 6.1, and 7.0 lines up to the stated fixed releases. The CVSS vector in NVD is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high impact if the attacker can reach the affected data path.
Defensive priority
Critical. Prioritize if the application stores YAML-serialized data in Active Record and any attacker-controlled or indirectly controlled database write path exists.
Recommended defensive actions
- Upgrade Active Record to a fixed release at or above 7.0.3.1, 6.1.6.1, 6.0.5.1, or 5.2.8.1, depending on the branch in use.
- Inventory uses of YAML serialization in Active Record models and reduce or remove YAML-serialized columns where feasible.
- Review whether any SQL injection, admin console access, import pipeline, or other database-write path could let an attacker influence serialized content.
- Treat the issue as especially urgent in applications that deserialize database-stored YAML into application objects.
- Validate remediation with dependency checks and regression testing around any model attributes that previously used YAML serialization.
Evidence notes
This debrief is based on the supplied NVD record and linked references. NVD lists the vulnerability as published on 2022-12-05T22:15:10.397Z and modified on 2026-05-11T18:16:29.250Z. The corpus includes the Rails security mailing list reference and a GitHub Advisory reference for patch guidance. No KEV entry was provided.
Official resources
-
CVE-2022-32224 CVE record
CVE.org
-
CVE-2022-32224 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Third Party Advisory
-
Source reference
af854a3a-2127-422b-91ae-364da2661108
Publicly disclosed on 2022-12-05 via the CVE/NVD record and referenced Rails security mailing list and advisory links in the supplied corpus.