CVE-2025-10148

CWE-34012 documents10 sources
Severity
5.3MEDIUM
EPSS
0.1%
top 69.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 12
Latest updateFeb 25

Description

curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content c

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

NVDhaxx/curl8.11.08.16.0
Alpinecurl< 8.14.1-r2+4
Debiancurl< 8.14.1-2+deb13u1+1
CVEListV5curl/curl8.15.08.15.0+7

Patches

🔴Vulnerability Details

5
OSV
curl vulnerabilities2026-02-25
OSV
CVE-2025-10148: curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says2025-09-12
OSV
CVE-2025-10148: curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says2025-09-12
GHSA
GHSA-cxvq-c3r3-8gwq: curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says2025-09-12
CVEList
predictable WebSocket mask2025-09-12

📋Vendor Advisories

4
Ubuntu
curl vulnerabilities2026-02-25
Red Hat
curl: predictable WebSocket mask2025-09-12
Microsoft
predictable WebSocket mask2025-09-09
Debian
CVE-2025-10148: curl - curl's websocket code did not update the 32 bit mask pattern for each new outgo...2025

💬Community

2
Bugzilla
CVE-2025-10148 curl: predictable WebSocket mask2025-09-12
HackerOne
CVE-2025-10148: predictable WebSocket mask2025-09-10
CVE-2025-10148 (MEDIUM CVSS 5.3) | curl's websocket code did not updat | cvebase.io