Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/67192?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/67192?format=api", "purl": "pkg:gem/uri@0.12.5", "type": "gem", "namespace": "", "name": "uri", "version": "0.12.5", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "0.13.3", "latest_non_vulnerable_version": "1.0.4", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24121?format=api", "vulnerability_id": "VCID-nw8a-e25n-mbgs", "summary": "URI Credential Leakage Bypass over CVE-2025-27221\nIn affected URI version, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials.\n\nWhen using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure.\n\nThe vulnerability affects the `uri` gem bundled with the following Ruby series:\n\n* 0.12.4 and earlier (bundled in Ruby 3.2 series)\n* 0.13.2 and earlier (bundled in Ruby 3.3 series)\n* 1.0.3 and earlier (bundled in Ruby 3.4 series)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61594.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61594.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03266", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03294", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03336", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03316", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03311", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03222", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0084", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00886", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61594" }, { "reference_url": "https://github.com/ruby/uri", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ruby/uri" }, { "reference_url": "https://github.com/ruby/uri/commit/20157e3e29b125ff41f1d9662e2e3b1d066f5902", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://github.com/ruby/uri/commit/20157e3e29b125ff41f1d9662e2e3b1d066f5902" }, { "reference_url": "https://github.com/ruby/uri/commit/7e521b2da0833d964aab43019e735aea674e1c2c", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://github.com/ruby/uri/commit/7e521b2da0833d964aab43019e735aea674e1c2c" }, { "reference_url": "https://github.com/ruby/uri/commit/d3116ca66a3b1c97dc7577f9d2d6e353f391cd6a", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://github.com/ruby/uri/commit/d3116ca66a3b1c97dc7577f9d2d6e353f391cd6a" }, { "reference_url": "https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594" }, { "reference_url": "https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594/", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1124379", "reference_id": "1124379", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1124379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426336", "reference_id": "2426336", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426336" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61594", "reference_id": "CVE-2025-61594", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61594" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml", "reference_id": "CVE-2025-61594.YML", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml" }, { "reference_url": "https://github.com/advisories/GHSA-22h5-pq3x-2gf2", "reference_id": "GHSA-22h5-pq3x-2gf2", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://github.com/advisories/GHSA-22h5-pq3x-2gf2" }, { "reference_url": "https://github.com/advisories/GHSA-j4pr-3wm6-xx2r", "reference_id": "GHSA-j4pr-3wm6-xx2r", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-j4pr-3wm6-xx2r" }, { "reference_url": "https://github.com/ruby/uri/security/advisories/GHSA-j4pr-3wm6-xx2r", "reference_id": "GHSA-j4pr-3wm6-xx2r", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T21:29:32Z/" } ], "url": "https://github.com/ruby/uri/security/advisories/GHSA-j4pr-3wm6-xx2r" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23062", "reference_id": "RHSA-2025:23062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23063", "reference_id": "RHSA-2025:23063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23141", "reference_id": "RHSA-2025:23141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23141" }, { "reference_url": "https://usn.ubuntu.com/8137-1/", "reference_id": "USN-8137-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8137-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/67192?format=api", "purl": "pkg:gem/uri@0.12.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/uri@0.12.5" }, { "url": "http://public2.vulnerablecode.io/api/packages/67193?format=api", "purl": "pkg:gem/uri@0.13.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/uri@0.13.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/67194?format=api", "purl": "pkg:gem/uri@1.0.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/uri@1.0.4" } ], "aliases": [ "CVE-2025-61594", "GHSA-j4pr-3wm6-xx2r" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nw8a-e25n-mbgs" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/uri@0.12.5" }