CVE-2025-27221: URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+
3.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.03044%
CWE
Published
3/3/2025
Updated
3/4/2025
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
uri | rubygems | < 0.11.3 | 0.11.3 |
uri | rubygems | >= 0.12.0, < 0.12.4 | 0.12.4 |
uri | rubygems | >= 0.13.0, < 0.13.2 | 0.13.2 |
uri | rubygems | >= 1.0.0, < 1.0.3 | 1.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies URI#join, URI#merge, and URI#+ as the affected methods. These are instance methods of the URI::Generic class in Ruby's URI gem, as confirmed by:
- The CVE's technical details describing host replacement without userinfo removal
- The linked GitHub pull requests (e.g., ruby/uri#154) showing fixes applied to URI::Generic's merge/join logic
- Ruby's URI module structure, where URI manipulation methods are defined in URI::Generic
- The CWE-212 mapping (improper data removal) aligning with the failure to clear userinfo during URI operations