Description
curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.
Published: 2026-04-06
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Internal Network Access via SSRF
Action: Immediate Patch
AI Analysis

Impact

curl_cffi, a Python binding for libcurl, contains a Server‑Side Request Forgery weakness (CWE‑918) that allows an attacker‑controlled URL to be requested without any restriction on internal address ranges. The library automatically follows HTTP redirects, so a malicious link can redirect traffic to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make the outbound request appear as legitimate browser traffic, potentially evading network controls that rely on client certificates or TLS fingerprint checks. This flaw enables an attacker to discover and interact with internal resources that should otherwise remain isolated from external inputs.

Affected Systems

All installations of the lexiforest curl_cffi package that are earlier than version 0.15.0—including the 0.15.0 beta releases (beta1 through beta4)—are affected. The issue is resolved in version 0.15.0 and later, which implements restrictions on target IP ranges and disables automatic redirect following for untrusted URLs.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.6, indicating high severity, while the EPSS score is below 1%, suggesting that exploit attempts are currently rare. It is not listed in the CISA KEV catalog. The attack vector is remote: an attacker supplies a crafted URL that curl_cffi follows, resulting in internal service exposure and possible bypass of network controls via TLS impersonation. Successful exploitation allows an adversary to gather internal host information or interact with restricted services, potentially escalating privileges if those services are further compromised.

Generated by OpenCVE AI on April 9, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade curl_cffi to version 0.15.0 or later
  • Modify application logic to prevent automatic redirects to untrusted URLs
  • Disable or restrict the TLS impersonation feature if upgrade is not immediately possible
  • Implement network‑level blocking of outbound connections to internal IP ranges from the host running curl_cffi
  • Monitor outbound traffic for unexpected redirects to internal addresses

Generated by OpenCVE AI on April 9, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qw2m-4pqf-rmpp curl_cffi: Redirect-based SSRF leads to internal network access in curl_cffi (with TLS impersonation bypass)
History

Thu, 09 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:lexiforest:curl_cffi:*:*:*:*:*:python:*:*
cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta1:*:*:*:python:*:*
cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta2:*:*:*:python:*:*
cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta3:*:*:*:python:*:*
cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta4:*:*:*:python:*:*

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Lexiforest
Lexiforest curl Cffi
Vendors & Products Lexiforest
Lexiforest curl Cffi

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.
Title Redirect-based SSRF leading to internal network access in curl_cffi (with TLS impersonation bypass)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Lexiforest Curl Cffi
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T15:40:54.380Z

Reserved: 2026-03-23T18:30:14.125Z

Link: CVE-2026-33752

cve-icon Vulnrichment

Updated: 2026-04-06T15:34:37.548Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T16:16:34.140

Modified: 2026-04-09T18:10:21.143

Link: CVE-2026-33752

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:15Z

Weaknesses