Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/uri@0.11.2
purl pkg:gem/uri@0.11.2
Next non-vulnerable version 0.12.5
Latest non-vulnerable version 1.0.4
Risk 3.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-n1ja-n53g-fycm
Aliases:
CVE-2025-27221
GHSA-22h5-pq3x-2gf2
URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem. ## Details The methods `URI#join`, `URI#merge`, and `URI#+` retained userinfo, such as `user:password`, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur. Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later. ## Affected versions uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2. ## Credits Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability.
0.11.3
Affected by 1 other vulnerability.
0.12.4
Affected by 1 other vulnerability.
0.13.2
Affected by 1 other vulnerability.
1.0.3
Affected by 1 other vulnerability.
VCID-nw8a-e25n-mbgs
Aliases:
CVE-2025-61594
GHSA-j4pr-3wm6-xx2r
URI Credential Leakage Bypass over CVE-2025-27221 In affected URI version, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. The vulnerability affects the `uri` gem bundled with the following Ruby series: * 0.12.4 and earlier (bundled in Ruby 3.2 series) * 0.13.2 and earlier (bundled in Ruby 3.3 series) * 1.0.3 and earlier (bundled in Ruby 3.4 series)
0.12.5
Affected by 0 other vulnerabilities.
0.13.3
Affected by 0 other vulnerabilities.
1.0.4
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-ajtx-8w3u-rkae URI gem has ReDoS vulnerability A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. [The Ruby advisory recommends](https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/) updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead: - For Ruby 3.0: Update to uri 0.10.3 - For Ruby 3.1 and 3.2: Update to uri 0.12.2. You can use gem update uri to update it. If you are using bundler, please add gem `uri`, `>= 0.12.2` (or other version mentioned above) to your Gemfile. CVE-2023-36617
GHSA-hww2-5g85-429m

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-17T00:04:54.167234+00:00 GitLab Importer Affected by VCID-nw8a-e25n-mbgs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2025-61594.yml 38.4.0
2026-04-16T23:22:07.744178+00:00 GitLab Importer Affected by VCID-n1ja-n53g-fycm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2025-27221.yml 38.4.0
2026-04-16T17:41:32.763490+00:00 Ruby Importer Affected by VCID-nw8a-e25n-mbgs https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml 38.4.0
2026-04-12T01:28:08.423730+00:00 GitLab Importer Affected by VCID-nw8a-e25n-mbgs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2025-61594.yml 38.3.0
2026-04-12T00:41:14.063697+00:00 GitLab Importer Affected by VCID-n1ja-n53g-fycm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2025-27221.yml 38.3.0
2026-04-11T21:39:29.634283+00:00 Ruby Importer Affected by VCID-nw8a-e25n-mbgs https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml 38.3.0
2026-04-03T01:36:53.343007+00:00 GitLab Importer Affected by VCID-nw8a-e25n-mbgs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2025-61594.yml 38.1.0
2026-04-03T00:49:09.124304+00:00 GitLab Importer Affected by VCID-n1ja-n53g-fycm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2025-27221.yml 38.1.0
2026-04-02T19:36:58.770172+00:00 Ruby Importer Affected by VCID-nw8a-e25n-mbgs https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml 38.1.0
2026-04-02T16:59:47.421253+00:00 GHSA Importer Fixing VCID-ajtx-8w3u-rkae https://github.com/advisories/GHSA-hww2-5g85-429m 38.1.0
2026-04-01T15:54:36.864232+00:00 Ruby Importer Affected by VCID-nw8a-e25n-mbgs https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml 38.0.0
2026-04-01T12:59:14.497958+00:00 GithubOSV Importer Fixing VCID-ajtx-8w3u-rkae https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-hww2-5g85-429m/GHSA-hww2-5g85-429m.json 38.0.0
2026-04-01T12:51:29.044101+00:00 GitLab Importer Fixing VCID-ajtx-8w3u-rkae https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/uri/CVE-2023-36617.yml 38.0.0