CVE-2026-25765: CWE-918: Server-Side Request Forgery (SSRF) in lostisland faraday
CVE-2026-25765 is a Server-Side Request Forgery (SSRF) vulnerability in the lostisland Faraday HTTP client library versions prior to 2. 14. 1. The issue arises from the build_exclusive_url method using Ruby's URI#merge, which treats protocol-relative URLs as network-path references, allowing an attacker to override the base URL's host. If user input is passed unchecked to Faraday's request methods, an attacker can supply a protocol-relative URL to redirect requests to arbitrary hosts, potentially accessing internal resources. The vulnerability has a CVSS score of 5. 8 (medium severity) and does not require authentication or user interaction. It affects applications using vulnerable Faraday versions and is fixed in version 2. 14. 1.
AI Analysis
Technical Summary
CVE-2026-25765 is a Server-Side Request Forgery (SSRF) vulnerability found in the lostisland Faraday HTTP client library, specifically in versions prior to 2.14.1. Faraday provides an abstraction layer over various HTTP adapters in Ruby applications. The vulnerability exists in the build_exclusive_url method located in lib/faraday/connection.rb, which uses Ruby's URI#merge method to combine a base URL with a user-supplied path. According to RFC 3986, protocol-relative URLs (e.g., //evil.com/path) are treated as network-path references that override the host and authority components of the base URL. This behavior allows an attacker to supply a protocol-relative URL as user input to Faraday's get(), post(), build_url(), or other request methods, causing the HTTP request to be redirected to an arbitrary external host controlled by the attacker. This SSRF flaw can be exploited without authentication or user interaction, enabling attackers to make server-side requests to unintended destinations, potentially exposing internal services or sensitive data. The vulnerability has a CVSS 3.1 score of 5.8, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, no user interaction, and a scope change. The flaw is fixed in Faraday version 2.14.1, where the handling of protocol-relative URLs was corrected to prevent overriding the base URL's host. No known exploits are reported in the wild as of the publication date. Organizations using Faraday versions below 2.14.1 in environments where user input is passed to HTTP request methods are vulnerable and should prioritize patching. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
For European organizations, this SSRF vulnerability poses a risk primarily to web applications and services that utilize the Faraday HTTP client library versions prior to 2.14.1 and accept user-controlled input for HTTP requests. Exploitation could allow attackers to make arbitrary HTTP requests from the vulnerable server to internal or external systems, potentially bypassing network access controls. This may lead to unauthorized access to internal services, data exfiltration, or reconnaissance of internal network infrastructure. While the vulnerability does not directly allow data modification or denial of service, the ability to pivot within internal networks or access sensitive endpoints can have significant security implications. Organizations in sectors with sensitive data or critical infrastructure, such as finance, healthcare, and government, may face increased risks. The medium severity rating reflects the moderate impact and ease of exploitation without authentication. Given the widespread use of Ruby and Faraday in web development, European organizations using these technologies should assess their exposure and remediate promptly to prevent potential SSRF exploitation.
Mitigation Recommendations
1. Upgrade all instances of the Faraday library to version 2.14.1 or later, where the vulnerability is fixed. 2. Implement strict input validation and sanitization on any user-supplied URLs or paths before passing them to Faraday request methods to prevent protocol-relative URLs or other malicious inputs. 3. Employ allowlisting of domains or IP addresses for outbound HTTP requests initiated by the application to restrict requests to trusted destinations only. 4. Use network segmentation and firewall rules to limit the vulnerable application's ability to reach sensitive internal resources or external untrusted networks. 5. Monitor application logs and network traffic for unusual outbound requests that may indicate attempted exploitation. 6. Conduct code reviews and security testing focusing on HTTP client usage patterns to identify and remediate similar SSRF risks. 7. Educate development teams about the risks of SSRF and secure handling of user input in HTTP requests. These measures combined will reduce the risk of exploitation beyond simply patching the library.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Ireland
CVE-2026-25765: CWE-918: Server-Side Request Forgery (SSRF) in lostisland faraday
Description
CVE-2026-25765 is a Server-Side Request Forgery (SSRF) vulnerability in the lostisland Faraday HTTP client library versions prior to 2. 14. 1. The issue arises from the build_exclusive_url method using Ruby's URI#merge, which treats protocol-relative URLs as network-path references, allowing an attacker to override the base URL's host. If user input is passed unchecked to Faraday's request methods, an attacker can supply a protocol-relative URL to redirect requests to arbitrary hosts, potentially accessing internal resources. The vulnerability has a CVSS score of 5. 8 (medium severity) and does not require authentication or user interaction. It affects applications using vulnerable Faraday versions and is fixed in version 2. 14. 1.
AI-Powered Analysis
Technical Analysis
CVE-2026-25765 is a Server-Side Request Forgery (SSRF) vulnerability found in the lostisland Faraday HTTP client library, specifically in versions prior to 2.14.1. Faraday provides an abstraction layer over various HTTP adapters in Ruby applications. The vulnerability exists in the build_exclusive_url method located in lib/faraday/connection.rb, which uses Ruby's URI#merge method to combine a base URL with a user-supplied path. According to RFC 3986, protocol-relative URLs (e.g., //evil.com/path) are treated as network-path references that override the host and authority components of the base URL. This behavior allows an attacker to supply a protocol-relative URL as user input to Faraday's get(), post(), build_url(), or other request methods, causing the HTTP request to be redirected to an arbitrary external host controlled by the attacker. This SSRF flaw can be exploited without authentication or user interaction, enabling attackers to make server-side requests to unintended destinations, potentially exposing internal services or sensitive data. The vulnerability has a CVSS 3.1 score of 5.8, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, no user interaction, and a scope change. The flaw is fixed in Faraday version 2.14.1, where the handling of protocol-relative URLs was corrected to prevent overriding the base URL's host. No known exploits are reported in the wild as of the publication date. Organizations using Faraday versions below 2.14.1 in environments where user input is passed to HTTP request methods are vulnerable and should prioritize patching. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
For European organizations, this SSRF vulnerability poses a risk primarily to web applications and services that utilize the Faraday HTTP client library versions prior to 2.14.1 and accept user-controlled input for HTTP requests. Exploitation could allow attackers to make arbitrary HTTP requests from the vulnerable server to internal or external systems, potentially bypassing network access controls. This may lead to unauthorized access to internal services, data exfiltration, or reconnaissance of internal network infrastructure. While the vulnerability does not directly allow data modification or denial of service, the ability to pivot within internal networks or access sensitive endpoints can have significant security implications. Organizations in sectors with sensitive data or critical infrastructure, such as finance, healthcare, and government, may face increased risks. The medium severity rating reflects the moderate impact and ease of exploitation without authentication. Given the widespread use of Ruby and Faraday in web development, European organizations using these technologies should assess their exposure and remediate promptly to prevent potential SSRF exploitation.
Mitigation Recommendations
1. Upgrade all instances of the Faraday library to version 2.14.1 or later, where the vulnerability is fixed. 2. Implement strict input validation and sanitization on any user-supplied URLs or paths before passing them to Faraday request methods to prevent protocol-relative URLs or other malicious inputs. 3. Employ allowlisting of domains or IP addresses for outbound HTTP requests initiated by the application to restrict requests to trusted destinations only. 4. Use network segmentation and firewall rules to limit the vulnerable application's ability to reach sensitive internal resources or external untrusted networks. 5. Monitor application logs and network traffic for unusual outbound requests that may indicate attempted exploitation. 6. Conduct code reviews and security testing focusing on HTTP client usage patterns to identify and remediate similar SSRF risks. 7. Educate development teams about the risks of SSRF and secure handling of user input in HTTP requests. These measures combined will reduce the risk of exploitation beyond simply patching the library.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.358Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a47984b57a58fa1702e39
Added to database: 2/9/2026, 8:46:16 PM
Last enriched: 2/17/2026, 9:48:12 AM
Last updated: 2/21/2026, 12:16:43 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.