Server-Side Request Forgery (SSRF) Affecting logstash-9.1-env2yaml package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-LOGSTASH91ENV2YAML-15308929
  • published19 Feb 2026
  • disclosed9 Feb 2026

Introduced: 9 Feb 2026

NewCVE-2026-25765  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest logstash-9.1-env2yaml.

NVD Description

Note: Versions mentioned in the description apply only to the upstream logstash-9.1-env2yaml package and not the logstash-9.1-env2yaml package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.