Home

Description

URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

PUBLISHED Reserved 2025-09-26 | Published 2025-12-30 | Updated 2025-12-30 | Assigner GitHub_M




LOW: 2.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer

Product status

Default status
unaffected

Any version before 0.12.5
affected

0.13.0 (custom) before 0.13.3
affected

1.0.0 (custom) before 1.0.4
affected

References

www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594/

github.com/...ory-db/blob/master/gems/uri/CVE-2025-61594.yml

github.com/...ommit/7e521b2da0833d964aab43019e735aea674e1c2c

github.com/...ommit/20157e3e29b125ff41f1d9662e2e3b1d066f5902

github.com/...ommit/d3116ca66a3b1c97dc7577f9d2d6e353f391cd6a

cve.org (CVE-2025-61594)

nvd.nist.gov (CVE-2025-61594)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.