devise 2.2.6

3 security vulnerabilities found in version 2.2.6

Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable module

critical severity CVE-2019-5421
critical severity CVE-2019-5421
Patched versions: >= 4.6.0

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie

high severity CVE-2015-8314
high severity CVE-2015-8314
Patched versions: >= 3.5.4

Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Devise Gem for Ruby confirmation token validation with a blank string

medium severity CVE-2019-16109
medium severity CVE-2019-16109
Patched versions: >= 4.7.1

Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. However, there is no scenario within Devise itself in which such database records would exist.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.