curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2664-1 | curl security update |
![]() |
DSA-4881-1 | curl security update |
![]() |
EUVD-2021-10011 | curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request. |
![]() |
USN-4898-1 | curl vulnerabilities |
![]() |
USN-4903-1 | curl vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 09 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-06-09T14:54:59.891Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-22876

Updated: 2024-08-03T18:51:07.627Z

Status : Modified
Published: 2021-04-01T18:15:12.823
Modified: 2025-06-09T15:15:23.067
Link: CVE-2021-22876


No data.