CVE-2025-27221

ADVISORY - github

Summary

There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem.

Details

The methods URI#join, URI#merge, and URI#+ retained userinfo, such as user:password, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur.

Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later.

Affected versions

uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2.

Credits

Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability.

EPSS Score: 0.00018 (0.032)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Removal of Sensitive Information Before Storage or Transfer

ADVISORY - github

Exposure of Sensitive Information to an Unauthorized Actor

Improper Removal of Sensitive Information Before Storage or Transfer

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Exposure of Sensitive Information to an Unauthorized Actor

Improper Removal of Sensitive Information Before Storage or Transfer

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Improper Removal of Sensitive Information Before Storage or Transfer


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in