CVE-2025-5025 log

Source
Severity Medium
Remote Yes
Type Certificate verification bypass
Description
libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL.

Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3.

Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
Group Package Affected Fixed Severity Status Ticket
AVG-2887 curl 8.13.0-2 Medium Not affected
References
https://curl.se/docs/CVE-2025-5025.html
https://hackerone.com/reports/3153497
Notes
We're not affected as we use OpenSSL as TLS backend.