CVE-2025-5025 log
| Source |
|
| Severity | Medium |
| Remote | Yes |
| Type | Certificate verification bypass |
| Description | libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-2887 | curl | 8.13.0-2 | Medium | Not affected |
| References |
|---|
https://curl.se/docs/CVE-2025-5025.html https://hackerone.com/reports/3153497 |
| Notes |
|---|
We're not affected as we use OpenSSL as TLS backend. |