curl's code for managing SSH connections when SFTP was done using the wolfSSH
powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
References
| Link | Resource |
|---|---|
| https://curl.se/docs/CVE-2025-10966.html | Vendor Advisory Patch |
| https://curl.se/docs/CVE-2025-10966.json | Vendor Advisory |
| https://hackerone.com/reports/3355218 | Exploit Issue Tracking Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2025/11/05/2 | Mailing List Third Party Advisory Patch |
Configurations
History
No history.
Information
Published : 2025-11-07 08:15
Updated : 2026-01-20 14:57
NVD link : CVE-2025-10966
Mitre link : CVE-2025-10966
CVE.ORG link : CVE-2025-10966
JSON object : View
Products Affected
haxx
- curl
CWE
