libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
References
Link | Resource |
---|---|
https://curl.se/docs/CVE-2025-4947.html | Vendor Advisory Patch |
https://curl.se/docs/CVE-2025-4947.json | Vendor Advisory |
https://hackerone.com/reports/3150884 | Exploit Patch Issue Tracking |
http://www.openwall.com/lists/oss-security/2025/05/28/4 | Mailing List Patch Third Party Advisory |
Configurations
History
26 Jun 2025, 15:08
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-28 07:15
Updated : 2025-06-26 15:08
NVD link : CVE-2025-4947
Mitre link : CVE-2025-4947
CVE.ORG link : CVE-2025-4947
JSON object : View
Products Affected
haxx
- curl
CWE
CWE-295
Improper Certificate Validation