CVE-2025-10966

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.
References
Link Resource
https://curl.se/docs/CVE-2025-10966.html Vendor Advisory Patch
https://curl.se/docs/CVE-2025-10966.json Vendor Advisory
https://hackerone.com/reports/3355218 Exploit Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/11/05/2 Mailing List Third Party Advisory Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-07 08:15

Updated : 2026-01-20 14:57


NVD link : CVE-2025-10966

Mitre link : CVE-2025-10966

CVE.ORG link : CVE-2025-10966


JSON object : View

Products Affected

haxx

  • curl