CVE-2025-14524

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
References
Link Resource
https://curl.se/docs/CVE-2025-14524.html Vendor Advisory Patch
https://curl.se/docs/CVE-2025-14524.json Vendor Advisory
https://hackerone.com/reports/3459417 Exploit Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2026/01/07/4 Mailing List Third Party Advisory Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-08 10:15

Updated : 2026-01-20 14:53


NVD link : CVE-2025-14524

Mitre link : CVE-2025-14524

CVE.ORG link : CVE-2025-14524


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')