Server-Side Request Forgery (SSRF) Affecting gitlab-cfssl-self-sign-scripts-18.3 package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-GITLABCFSSLSELFSIGNSCRIPTS183-15261441
  • published11 Feb 2026
  • disclosed9 Feb 2026

Introduced: 9 Feb 2026

CVE-2026-25765  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest gitlab-cfssl-self-sign-scripts-18.3.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gitlab-cfssl-self-sign-scripts-18.3 package and not the gitlab-cfssl-self-sign-scripts-18.3 package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.

CVSS Base Scores

version 3.1