Description
curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.
Published: 2026-04-06
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: Internal Network Access via SSRF
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates in the curl_cffi Python binding. Versions before 0.15.0 are missing safeguards that block request redirects to internal IP ranges. When an attacker supplies a specially crafted URL, curl_cffi automatically follows the redirect using libcurl, allowing a request to be sent to internal services such as cloud metadata endpoints. The library's TLS impersonation feature can make these internal requests appear as legitimate browser traffic, potentially bypassing network controls. This flaw enables attackers to obtain sensitive internal data or credentials, directly impacting confidentiality and potentially integrity of the system. The weakness is classified as an SSRF, CWE‑918.

Affected Systems

Lexiforest’s curl_cffi library is affected. All releases prior to version 0.15.0 are vulnerable. The issue persists in any installation of curl_cffi that relies on default redirect behavior without explicit restrictions, regardless of the Python application using it.

Risk and Exploitability

The CVSS score of 8.6 marks the flaw as high severity. No EPSS data is available, so the precise likelihood of exploitation remains unknown, but the lack of restriction on internal redirects and the ability to masquerade traffic suggest that the threat adversary can execute an attack without complex conditions. The flaw is not currently listed in the CISA KEV catalog, indicating no confirmed public exploits yet. Nevertheless, the potential impact warrants prompt mitigation.

Generated by OpenCVE AI on April 6, 2026 at 17:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade curl_cffi to version 0.15.0 or newer.

Generated by OpenCVE AI on April 6, 2026 at 17:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qw2m-4pqf-rmpp curl_cffi: Redirect-based SSRF leads to internal network access in curl_cffi (with TLS impersonation bypass)
History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Lexiforest
Lexiforest curl Cffi
Vendors & Products Lexiforest
Lexiforest curl Cffi

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.
Title Redirect-based SSRF leading to internal network access in curl_cffi (with TLS impersonation bypass)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Lexiforest Curl Cffi
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T15:40:54.380Z

Reserved: 2026-03-23T18:30:14.125Z

Link: CVE-2026-33752

cve-icon Vulnrichment

Updated: 2026-04-06T15:34:37.548Z

cve-icon NVD

Status : Received

Published: 2026-04-06T16:16:34.140

Modified: 2026-04-06T16:16:34.140

Link: CVE-2026-33752

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:30Z

Weaknesses