Vulnerability Description
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL, the code used that URL as-is and ignored the base URL. The request—and any authentication headers, cookies, or tokens attached by the connector—was then sent to the attacker-controlled host. If the endpoint could be influenced by user input or configuration (e.g. redirect_uri, callback URL), this allowed server-side request forgery (SSRF) and/or credential leakage to a third-party host. The fix in version 4.0.0 is to reject absolute URLs in the endpoint: URLHelper::join() throws InvalidArgumentException when the endpoint is a valid absolute URL, unless explicitly allowed, requiring callers to opt-in to the functionality on a per-connector or per-request basis.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Saloon | Saloon | < 4.0.0 |
Related Weaknesses (CWE)
References
- https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4Release Notes
- https://github.com/saloonphp/saloon/security/advisories/GHSA-c83f-3xp6-hfcpVendor Advisory
FAQ
What is CVE-2026-33182?
CVE-2026-33182 is a vulnerability with a CVSS score of 7.5 (HIGH). Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endp...
How severe is CVE-2026-33182?
CVE-2026-33182 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33182?
Check the references section above for vendor advisories and patch information. Affected products include: Saloon Saloon.