CVE-2025-15346

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.
CVSS

No CVSS.

Configurations

No configuration.

History

No history.

Information

Published : 2026-01-08 00:15

Updated : 2026-01-08 18:08


NVD link : CVE-2025-15346

Mitre link : CVE-2025-15346

CVE.ORG link : CVE-2025-15346


JSON object : View

Products Affected

No product.

CWE
CWE-287

Improper Authentication

CWE-306

Missing Authentication for Critical Function