Description
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,
POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new
target host.
Published: 2026-01-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure via bearer token leakage across protocols
Action: Apply patch
AI Analysis

Impact

The flaw allows an OAuth2 bearer token originally intended for an HTTPS transfer to be inadvertently forwarded to a downstream host when the transfer follows a cross‑protocol redirect to protocols such as IMAP, LDAP, POP3 or SMTP. This results in token leakage that could grant an attacker unauthorized access to resources protected by the token. The weakness is a type of redirect to an unexpected protocol (CWE‑601) and results in a moderate security impact.

Affected Systems

The vulnerability is present in the curl client library produced by Haxx. No specific affected versions are listed in the CNA data, so administrators should review the latest release notes for any applied fix and test their current installations for the presence of the bug.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, while the EPSS score of less than 1% indicates that the likelihood of exploitation is low at present. Because the attack requires a curl client to perform a redirect to a non‑HTTP schema, the exposure is limited to environments that use curl in such a way that a redirect might target IMAP/LDAP/etc. The vulnerability is not listed in CISA’s KEV catalog, so no large‑scale exploitation is currently documented. Nevertheless, any pipeline that issues curl requests with bearer tokens should be assessed for the presence of cross‑protocol redirects to ensure the token is not leaked.

Generated by OpenCVE AI on April 27, 2026 at 21:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade curl to the latest stable release that includes the fix for CVE‑2025‑14524.
  • Configure curl to disallow redirects to non‑HTTP protocols by using the --proto-redir flag to permit only http, https, or other safe schemes when a bearer token is involved.
  • Review any scripts or services that use curl with bearer tokens and verify that they do not use cross‑protocol redirects; remove such redirects or wrap calls in token‑opaque handlers.

Generated by OpenCVE AI on April 27, 2026 at 21:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8062-1 curl vulnerabilities
History

Tue, 20 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Haxx
Haxx curl
Weaknesses CWE-601
CPEs cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Vendors & Products Haxx
Haxx curl

Fri, 09 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Curl
Curl curl
Vendors & Products Curl
Curl curl

Thu, 08 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
References

Thu, 08 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
Title bearer token leak on cross-protocol redirect
References

cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2026-04-02T13:20:16.344Z

Reserved: 2025-12-11T08:04:14.328Z

Link: CVE-2025-14524

cve-icon Vulnrichment

Updated: 2026-01-08T11:06:18.117Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T10:15:46.607

Modified: 2026-01-20T14:53:11.017

Link: CVE-2025-14524

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T21:45:14Z

Weaknesses