CVE-2025-15224

Severity
3.1LOW
EPSS
0.1%
top 75.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 8
Latest updateMar 3

Description

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 1.6 | Impact: 1.4

Affected Packages4 packages

NVDhaxx/curl7.58.08.18.0
Debiancurl< 8.18.0-1
Ubuntucurl< 7.35.0-1ubuntu2.20+esm19+3
CVEListV5curl/curl8.17.08.17.0+69

Patches

🔴Vulnerability Details

4
OSV
curl vulnerabilities2026-03-03
OSV
CVE-2025-15224: When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate usin2026-01-08
GHSA
GHSA-hccr-q52r-4w88: When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate usin2026-01-08
CVEList
libssh key passphrase bypass without agent set2026-01-08

📋Vendor Advisories

4
Ubuntu
curl vulnerabilities2026-03-03
Ubuntu
curl vulnerabilities2026-02-25
Red Hat
curl: libssh key passphrase bypass without agent set2026-01-07
Debian
CVE-2025-15224: curl - When doing SSH-based transfers using either SCP or SFTP, and asked to do public ...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-15224 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

2
HackerOne
CVE-2025-15224: libssh key passphrase bypass without agent set2026-01-07
Bugzilla
CVE-2025-15224 curl: libssh key passphrase bypass without agent set2025-12-31
CVE-2025-15224 (LOW CVSS 3.1) | When doing SSH-based transfers usin | cvebase.io