CVE-2026-33637
Published:May 19, 2026
Updated:May 23, 2026
Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Versions 2.0.0 through 2.14.1 still allow protocol-relative host override when the request target is passed as a URI object (rather than a String) to Faraday::Connection#build_exclusive_url. This bypasses the February 2026 fix for GHSA-33mh-2634-fwr2 and enables off-host request forgery: a request built from a fixed-base Faraday::Connection can be redirected to an attacker-controlled host, forwarding connection-scoped values such as Authorization headers and default query parameters. This issue has been fixed in version 2.14.3.
Affected Packages
faraday (RUBY):
Affected version(s) >=2.0.0 <2.14.2Fix Suggestion:
Update to version 2.14.2Related Resources (3)
Do you need more information?
Contact UsWeakness Type (CWE)
Server-Side Request Forgery (SSRF)
EPSS
Base Score:
0.01