CVE ReportsFaraday SSRF: When a Double Slash Becomes a Double Agent Vulnerability ID:...
Vulnerability ID: CVE-2026-25765
CVSS Score: 5.8
Published: 2026-02-09
A high-severity Server-Side Request Forgery (SSRF) vulnerability in the popular Ruby 'faraday' gem allows attackers to redirect HTTP requests to arbitrary hosts using protocol-relative URLs. By supplying a path starting with double slashes (//), an attacker can bypass path sanitization logic, causing the library to treat the input as a new network authority rather than a relative path.
Faraday < 2.14.1 fails to sanitize protocol-relative URLs (e.g., '//attacker.com'). This allows attackers to bypass the intended base URL and force the application to send requests (and potentially sensitive headers) to an external server.
2.14.1)Fix: ensure relative url with double slash is parsed correctly
@@ -481,7 +481,8 @@
end
- url = "./#{url}" if url.respond_to?(:start_with?) && !url.start_with?('http://', 'https://', '/', './', '../')
+ url = "./#{url}" if url.respond_to?(:start_with?) &&
+ (!url.start_with?('http://', 'https://', '/', './', '../') || url.start_with?('//'))
conn.get() or conn.post() methodsRemediation Steps:
bundle show faraday
gem 'faraday', '>= 2.14.1'
bundle update faraday
//example.com to a test connectionRead the full report for CVE-2026-25765 on our website for more details including interactive diagrams and full exploit analysis.