CVE-2026-33182: Server-Side Request Forgery and Credential Leakage in Saloon PHP
Vulnerability ID: CVE-2026-33182
CVSS Score: 6.6
Published: 2026-03-25
Saloon PHP library versions prior to 4.0.0 are vulnerable to Server-Side Request Forgery (SSRF) and credential leakage. The library's URL construction logic permits absolute URLs provided as endpoints to override the configured base URL, causing the library to transmit sensitive connector-level state to arbitrary attacker-controlled hosts.
TL;DR
A flaw in Saloon PHP < 4.0.0 allows attacker-supplied absolute URLs to override the base URL, leaking authentication headers and tokens to third-party servers.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-918
- Attack Vector: Network
- CVSS Score: 6.6 (Medium)
- Impact: High Confidentiality (Credential Leakage)
- Exploit Status: Proof of Concept Available
- Authentication: None Required
Affected Systems
- Saloon PHP Library (< 4.0.0)
-
Saloon: < 4.0.0 (Fixed in:
4.0.0)
Code Analysis
Commit: d418356
Foundational fix restricting absolute URL overrides in endpoints
Commit: 1307b1d
Implementation of explicit opt-in logic for base URL overrides
Mitigation Strategies
- Upgrade Saloon PHP library to version 4.0.0.
- Audit custom Request classes for unvalidated user input in
resolveEndpoint(). - Implement strict allowlists for any dynamically generated outbound URLs.
- Ensure
allowBaseUrlOverrideis strictly scoped to specific requests and never enabled globally.
Remediation Steps:
- Modify
composer.jsonto requiresaloonphp/saloon: ^4.0. - Run
composer update saloonphp/saloon. - Review the Saloon v3 to v4 upgrade guide for breaking changes.
- Locate all instances of
resolveEndpoint()and verify input sanitization. - Apply the
allowBaseUrlOverride = trueproperty only to trusted, statically defined endpoint configurations.
References
- GitHub Advisory GHSA-c83f-3xp6-hfcp
- Saloon Upgrade Guide (v3 to v4)
- Fix Commit (Foundational)
- Fix Commit (Opt-in Logic)
Read the full report for CVE-2026-33182 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)