Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.

Project Subscriptions

Vendors Products
Faraday Project Subscribe
Faraday Subscribe
Lostisland Subscribe
Faraday Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-33mh-2634-fwr2 Faraday affected by SSRF via protocol-relative URL host override in build_exclusive_url
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Faraday Project
Faraday Project faraday
CPEs cpe:2.3:a:faraday_project:faraday:*:*:*:*:*:*:*:*
Vendors & Products Faraday Project
Faraday Project faraday

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Lostisland
Lostisland faraday
Vendors & Products Lostisland
Lostisland faraday

Tue, 10 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1289
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 09 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.
Title Faraday affected by SSRF via protocol-relative URL host override in build_exclusive_url
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T15:59:26.645Z

Reserved: 2026-02-05T18:35:52.358Z

Link: CVE-2026-25765

cve-icon Vulnrichment

Updated: 2026-02-10T15:39:45.460Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T21:15:49.490

Modified: 2026-02-20T21:03:57.723

Link: CVE-2026-25765

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-09T20:30:58Z

Links: CVE-2026-25765 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-10T11:35:14Z

Weaknesses