Description
Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Versions 2.0.0 through 2.14.1 still allow protocol-relative host override when the request target is passed as a URI object (rather than a String) to Faraday::Connection#build_exclusive_url. This bypasses the February 2026 fix for GHSA-33mh-2634-fwr2 and enables off-host request forgery: a request built from a fixed-base Faraday::Connection can be redirected to an attacker-controlled host, forwarding connection-scoped values such as Authorization headers and default query parameters. This issue has been fixed in version 2.14.3.
Published: 2026-05-19
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Faraday is a Ruby HTTP client library that abstracts multiple adapters under a single interface. A defect in its URL building routine allows protocol-relative URIs to override the connection’s host when the target is supplied as a URI object rather than a plain string. The vulnerability is a manifestation of CWE‑918 and enables off-host request forgery: attackers can redirect a connection that has been pre-configured with credentials or query parameters to an arbitrary, attacker-controlled domain, causing those sensitive values to be sent to an unintended host.

Affected Systems

The flaw affects all instances of the lostisland Faraday library from version 2.0.0 through 2.14.1. The issue was addressed in commit 2.14.3. Any project that uses Faraday within that version range, especially those that construct requests from externally supplied URI objects, is at risk unless mitigation measures are applied.

Risk and Exploitability

EPSS data is not available and the vulnerability is not listed in CISA KEV, so no known exploitation activity has been reported. The CVSS score is not disclosed, yet the missing host scoping control exposes applications to off-host request forgery, where an attacker can force the client to send requests to an arbitrary domain while leaking Authorization headers and default query parameters. Based on the description, the likely attack vector is remote: an adversary that can inject a URI object passed to Faraday::Connection#build_exclusive_url can exploit the flaw, which is common in applications that forward untrusted URLs to the HTTP client.

Generated by OpenCVE AI on May 19, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Faraday to version 2.14.3 or later
  • In application code, avoid passing untrusted URI objects to Faraday::Connection#build_exclusive_url; instead supply fully-qualified URLs as strings or sanitize the object to remove protocol-relative components
  • Apply input validation to ensure that any URI objects originate from trusted, internal sources and do not contain protocol-relative prefixes; consider disabling or overriding Faraday's discovery of the base host for outbound requests

Generated by OpenCVE AI on May 19, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5rv5-xj5j-3484 Faraday has a possible incomplete fix for GHSA-33mh-2634-fwr2: protocol-relative URI objects still bypass host scoping
History

Tue, 19 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Lostisland
Lostisland faraday
Vendors & Products Lostisland
Lostisland faraday

Tue, 19 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Versions 2.0.0 through 2.14.1 still allow protocol-relative host override when the request target is passed as a URI object (rather than a String) to Faraday::Connection#build_exclusive_url. This bypasses the February 2026 fix for GHSA-33mh-2634-fwr2 and enables off-host request forgery: a request built from a fixed-base Faraday::Connection can be redirected to an attacker-controlled host, forwarding connection-scoped values such as Authorization headers and default query parameters. This issue has been fixed in version 2.14.3.
Title Faraday: Protocol-relative URI objects still bypass host scoping (possible incomplete fix for GHSA-33mh-2634-fwr2)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


Subscriptions

Lostisland Faraday
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-19T18:37:22.100Z

Reserved: 2026-03-23T14:24:11.619Z

Link: CVE-2026-33637

cve-icon Vulnrichment

Updated: 2026-05-19T18:37:17.869Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T19:16:49.113

Modified: 2026-05-19T21:08:41.030

Link: CVE-2026-33637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T20:00:13Z

Weaknesses