Skip to content

Security: ideacrew/edi_gateway

Security

SECURITY.md

Security Policy

Vulnerability Mitigations

CVE-2026-25765 - Faraday SSRF via protocol-relative URL host override

Vulnerability: Faraday versions below 2.14.1 are affected by SSRF in URL handling (GHSA-33mh-2634-fwr2).

Current Status: EDI GW is currently pinned to Faraday 1.x through the event_source dependency chain.

Mitigation: This CVE is temporarily added to .bundler-audit.yml as we are upgrading Rails 8 in parallel. The long-term fix is to upgrade event_source to Faraday >= 2.14.1.

Actions Taken:

  1. Documented vulnerability and mitigation plan in this file.
  2. Added CVE-2026-25765 to bundler-audit ignore list as a temporary exception.
  3. Tracked follow-up to remove the exception after Faraday 2 upgrade.

Ongoing Measures:

  1. Keep this exception time boxed for 90 days as Rails 8 upgrade is coming soon.
  2. Remove the ignore entry after dependency upgrade.

Unmaintained Dependency

Vulnerability: Support for Ruby 3.2.2 ends on 2026-03-31

Current Status: EDI GW is currently pinned to Ruby version 3.2.2

Mitigation: This warning is temporariliy added to brakeman.ignore as we have a planned Ruby upgrade. The long-term fix is to upgrade Ruby to 3.2.10.

Actions Taken:

  1. Documented vulnerability and mitigation plan in this file.
  2. Added warning to brakeman.ignore list as a temporary exception.

Ongoing Measures:

  1. Created a reminder to periodicially search for any new vulnerabilities with this Ruby verison
  2. Remove the ignore entry after dependency upgrade.

There aren’t any published security advisories