Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33182: CWE-918: Server-Side Request Forgery (SSRF) in saloonphp saloon

0
Medium
VulnerabilityCVE-2026-33182cvecve-2026-33182cwe-918cwe-522
Published: Thu Mar 26 2026 (03/26/2026, 00:22:14 UTC)
Source: CVE Database V5
Vendor/Project: saloonphp
Product: saloon

Description

Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL, the code used that URL as-is and ignored the base URL. The request—and any authentication headers, cookies, or tokens attached by the connector—was then sent to the attacker-controlled host. If the endpoint could be influenced by user input or configuration (e.g. redirect_uri, callback URL), this allowed server-side request forgery (SSRF) and/or credential leakage to a third-party host. The fix in version 4.0.0 is to reject absolute URLs in the endpoint: URLHelper::join() throws InvalidArgumentException when the endpoint is a valid absolute URL, unless explicitly allowed, requiring callers to opt-in to the functionality on a per-connector or per-request basis.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:17:32 UTC

Technical Analysis

Saloon is a PHP library designed to facilitate API integrations and SDK development by providing tools to build HTTP requests. In versions prior to 4.0.0, Saloon constructs request URLs by combining a connector's base URL with a specified request endpoint. However, if the endpoint is a valid absolute URL, the library uses it directly, ignoring the base URL. This behavior allows an attacker to supply an absolute URL as the endpoint, causing the server to send requests to arbitrary external hosts. Critically, these requests include authentication headers, cookies, or tokens attached by the connector, potentially exposing sensitive credentials to attacker-controlled servers. This Server-Side Request Forgery (SSRF) vulnerability (CWE-918) can be triggered if user input or configuration parameters (e.g., redirect_uri or callback URLs) influence the endpoint URL. The vulnerability also relates to CWE-522, indicating exposure of credentials. The fix introduced in Saloon 4.0.0 enforces validation by rejecting absolute URLs in endpoints unless explicitly permitted, throwing an InvalidArgumentException otherwise. This change requires developers to opt-in to absolute URL usage on a per-connector or per-request basis, effectively preventing unintended SSRF attacks and credential leakage. No known exploits are reported in the wild yet, but the vulnerability is publicly disclosed with a CVSS 4.0 score of 6.6, reflecting a medium severity impact with network attack vector, no privileges or user interaction required, and high confidentiality impact.

Potential Impact

The SSRF vulnerability in Saloon can have significant consequences for organizations that use this library in their PHP applications for API integrations. Attackers can exploit this flaw to make the server send crafted requests to internal or external systems, potentially bypassing network restrictions and accessing sensitive internal resources. The inclusion of authentication headers and tokens in these requests can lead to credential leakage, enabling attackers to impersonate the server or escalate attacks against other services. This can result in unauthorized data access, data exfiltration, or further compromise of internal systems. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and silently if user-controlled input influences the endpoint URL. The impact is particularly severe in environments where Saloon is used to interact with critical APIs or services containing sensitive data. Although no active exploits are known, the risk of exploitation increases as the vulnerability becomes publicly known. Organizations failing to upgrade or validate endpoint URLs may face data breaches, service disruptions, and reputational damage.

Mitigation Recommendations

Organizations should immediately upgrade Saloon to version 4.0.0 or later, where the vulnerability is fixed by rejecting absolute URLs in request endpoints by default. If upgrading is not immediately possible, developers must audit all usage of Saloon in their codebases to identify any instances where user input or configuration parameters influence the request endpoint. They should implement strict input validation and sanitization to prevent attacker-controlled absolute URLs. Additionally, developers should avoid passing absolute URLs as endpoints unless explicitly required and opt-in to this functionality with caution. Network-level controls such as egress filtering and web application firewalls (WAFs) can help detect and block suspicious outbound requests to unexpected destinations. Monitoring logs for unusual outbound HTTP requests originating from servers using Saloon can provide early detection of exploitation attempts. Finally, review and rotate any credentials or tokens that may have been exposed if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T22:16:36.720Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c4854ef4197a8e3b9c70b2

Added to database: 3/26/2026, 1:01:02 AM

Last enriched: 3/26/2026, 1:17:32 AM

Last updated: 3/26/2026, 5:39:52 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses