CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-5025: No QUIC certificate pinning with wolfSSL

Description

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.

Classification

CVE ID: CVE-2025-5025

Problem Types

CWE-295 Improper Certificate Validation

Affected Products

Vendor: curl

Product: curl

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 2.74% (scored less or equal to compared to others)

EPSS Date: 2025-06-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-5025
https://curl.se/docs/CVE-2025-5025.json
https://curl.se/docs/CVE-2025-5025.html
https://hackerone.com/reports/3153497

Timeline