CVE-2025-61594

Source
https://cve.org/CVERecord?id=CVE-2025-61594
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-61594.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-61594
Aliases
Downstream
Related
Published
2025-12-30T21:03:08.990Z
Modified
2026-05-15T04:14:08.075948621Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N CVSS Calculator
Summary
URI Credential Leakage Bypass over CVE-2025-27221
Details

URI is a module providing classes to handle Uniform Resource Identifiers. In versions 0.12.4 and earlier (bundled in Ruby 3.2 series) 0.13.2 and earlier (bundled in Ruby 3.3 series), 1.0.3 and earlier (bundled in Ruby 3.4 series), when using the + operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. This is a a bypass for the fix to CVE-2025-27221 that can expose user credentials. This issue has been fixed in versions 0.12.5, 0.13.3 and 1.0.4.

Database specific
{
    "cwe_ids": [
        "CWE-200",
        "CWE-212"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/61xxx/CVE-2025-61594.json"
}
References

Affected packages