Wiz Agents & Workflows are here

CVE-2026-25765
Ruby vulnerability analysis and mitigation

Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.


SourceNVD

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34060HIGH7.1
  • RubyRuby
  • ruby-lsp
NoYesMar 31, 2026
CVE-2026-33635MEDIUM4.3
  • RubyRuby
  • ruby-icalendar
NoYesMar 26, 2026
GHSA-2j22-pr5w-6gq8LOW2.3
  • RubyRuby
  • loofah
NoYesMar 26, 2026
CVE-2026-33658LOW2.3
  • RubyRuby
  • activestorage
NoYesMar 26, 2026
GHSA-53p3-c7vp-4mccLOW2.1
  • JavaScriptJavaScript
  • action_text-trix
NoYesMar 29, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management