| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-33mh-2634-fwr2 | Faraday affected by SSRF via protocol-relative URL host override in build_exclusive_url |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lostisland
Lostisland faraday |
|
| Vendors & Products |
Lostisland
Lostisland faraday |
Tue, 10 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1289 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 09 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1. | |
| Title | Faraday affected by SSRF via protocol-relative URL host override in build_exclusive_url | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T15:59:26.645Z
Reserved: 2026-02-05T18:35:52.358Z
Link: CVE-2026-25765
Updated: 2026-02-10T15:39:45.460Z
Status : Awaiting Analysis
Published: 2026-02-09T21:15:49.490
Modified: 2026-02-09T21:55:30.093
Link: CVE-2026-25765
OpenCVE Enrichment
Updated: 2026-02-10T11:35:14Z
Github GHSA