CVE-2025-5025

Severity
4.8MEDIUM
EPSS
0.1%
top 81.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 28

Description

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 2.2 | Impact: 2.5

Affected Packages3 packages

NVDhaxx/curl8.5.08.14.0
Debiancurl< 8.14.0-1+1
CVEListV5curl/curl8.13.08.13.0+13

🔴Vulnerability Details

3
GHSA
GHSA-x8ch-h5vv-q6cm: libcurl supports *pinning* of the server certificate public key for HTTPS transfers2025-05-28
OSV
CVE-2025-5025: libcurl supports *pinning* of the server certificate public key for HTTPS transfers2025-05-28
CVEList
No QUIC certificate pinning with wolfSSL2025-05-28

📋Vendor Advisories

3
Red Hat
curl: libcurl: QUIC Certificate Pinning Bypass2025-05-28
Microsoft
No QUIC certificate pinning with wolfSSL2025-05-13
Debian
CVE-2025-5025: curl - libcurl supports *pinning* of the server certificate public key for HTTPS transf...2025

💬Community

1
HackerOne
CVE-2025-5025: No QUIC certificate pinning with wolfSSL2025-05-28
CVE-2025-5025 (MEDIUM CVSS 4.8) | libcurl supports *pinning* of the s | cvebase.io