CVE-2025-5025
UNKNOWN
Published 2025-05-28T06:29:51.915Z
Actions:
CVSS Score
V3.1
4.8
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score Metrics
Exploitability: N/A
Impact: N/A
Attack Vector Metrics
Impact Metrics
Description
libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
Available Exploits
No exploits available for this CVE.
Related News
[SECURITY ADVISORY] curl: No QUIC certificate pinning with wolfSSL
Posted by Daniel Stenberg on May 27No QUIC certificate pinning with wolfSSL ======================================== Project curl Security Advisory, May 28 2025 - [Permalink](https://curl.se/docs/CVE-2025-5025.html) VULNERABILITY ------------- libcurl supp…
Seclists.org
2025-05-28 05:54
Affected Products
References
Published: 2025-05-28T06:29:51.915Z
Last Modified: 2025-05-30T16:19:53.775Z
Copied to clipboard!