CVE-2026-33182 PUBLISHED

Saloon is vulnerable to SSRF and credential leakage via absolute URL in endpoint overriding base URL

Assigner: GitHub_M
Reserved: 17.03.2026 Published: 26.03.2026 Updated: 26.03.2026

Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL, the code used that URL as-is and ignored the base URL. The request—and any authentication headers, cookies, or tokens attached by the connector—was then sent to the attacker-controlled host. If the endpoint could be influenced by user input or configuration (e.g. redirect_uri, callback URL), this allowed server-side request forgery (SSRF) and/or credential leakage to a third-party host. The fix in version 4.0.0 is to reject absolute URLs in the endpoint: URLHelper::join() throws InvalidArgumentException when the endpoint is a valid absolute URL, unless explicitly allowed, requiring callers to opt-in to the functionality on a per-connector or per-request basis.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
CVSS Score: 6.6

Product Status

Vendor saloonphp
Product saloon
Versions
  • Version < 4.0.0 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE
  • CWE-522: Insufficiently Protected Credentials CWE