CVE-2025-13034

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.
References
Link Resource
https://curl.se/docs/CVE-2025-13034.html Vendor Advisory Patch
https://curl.se/docs/CVE-2025-13034.json Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-08 10:15

Updated : 2026-01-20 14:54


NVD link : CVE-2025-13034

Mitre link : CVE-2025-13034

CVE.ORG link : CVE-2025-13034


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation