CVE-2025-14524
MediumVulnerability Description
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,
POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new
target host.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Known Affected Software
103 configuration(s) from 1 vendor(s)
cpe:2.3:a:haxx:curl:7.80.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.2.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.7.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.64.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.14.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.63.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.88.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.79.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.77.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.3:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.84.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.82.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.74.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.10.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.55.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.75.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.69.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.59.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.70.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.87.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.69.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.61.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.12.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.68.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.62.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.76.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.66.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.72.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.81.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.85.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.12.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.67.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.88.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.79.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.57.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.73.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.60.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.76.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.9.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.14.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.64.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.11.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.86.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.11.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.58.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.13.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.78.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.71.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.71.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.10.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.83.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.83.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.61.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
CPUAPR2026
Oracle Critical Patch Update Advisory - April 2026
USN-8062-1
USN-8062-1: curl vulnerabilities
References & Resources
-
https://curl.se/docs/CVE-2025-14524.html2499f714-1537-4658-8207-48ae4bb9eae9 Vendor Advisory Patch
-
https://curl.se/docs/CVE-2025-14524.json2499f714-1537-4658-8207-48ae4bb9eae9 Vendor Advisory
-
https://hackerone.com/reports/34594172499f714-1537-4658-8207-48ae4bb9eae9 Exploit Issue Tracking Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2026/01/07/4af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory Patch
Severity Details
Weakness Type (CWE)
URL Redirection to Untrusted Site ('Open Redirect')
- Description
- The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
- Exploit Likelihood
- Low
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- January 08, 2026
