Description
libcurl might in some circumstances reuse the wrong connection for SMB(S)
transfers.

libcurl features a pool of recent connections so that subsequent requests can
reuse an existing connection to avoid overhead.

When reusing a connection a range of criteria must be met. Due to a logical
error in the code, a network transfer operation that was requested by an
application could wrongfully reuse an existing SMB connection to the same
server that was using a different 'share' than the new subsequent transfer
should.

This could in unlucky situations lead to the download of the wrong file or the
upload of a file to the wrong place. When this happens, the same credentials
are used and the server name is the same.
Published: 2026-05-13
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Libcurl’s SMB connection reuse logic contains a logical error that can cause a transfer to occur on an unintended share. As a result, a download may pull the wrong file or an upload may place a file in an incorrect location while using the same credentials and server name. This flaw, identified as CWE‑1025 and CWE‑918, undermines data integrity by enabling accidental or malicious leakage or corruption of data.

Affected Systems

The cURL client, which incorporates libcurl, is specifically mentioned as an affected vendor/product. Because libcurl is a widely used library, any application that relies on cURL to perform SMB transfers could also be affected, provided it uses SMB functionality. The precise version range is not listed, so any libcurl installation that has not received the fix may be vulnerable.

Risk and Exploitability

The CVSS score of 7.5 classifies the issue as high severity, while the EPSS score of less than 1% indicates a low but non‑zero likelihood of exploitation. The vulnerability is not included in the CISA KEV catalog. An attacker would need to influence the SMB transfer parameters set by the vendor application, for example by supplying crafted requests or modifying local configuration, to trigger a cross‑share data transfer.

Generated by OpenCVE AI on May 13, 2026 at 21:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade libcurl to a release that contains the SMB connection reuse fix, ensuring the latest stable version from the libcurl project is installed.
  • If an immediate upgrade is not possible, configure the application to disable SMB connection reuse or enforce strict binding of each connection to a single share, thereby preventing accidental cross‑share transfers.
  • Validate the intended SMB share and file path before initiating any transfer, checking that the application’s logic matches the desired resource and preventing unintended uploads or downloads.

Generated by OpenCVE AI on May 13, 2026 at 21:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8227-1 curl vulnerabilities
History

Wed, 13 May 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Haxx
Haxx curl
Weaknesses CWE-918
CPEs cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Vendors & Products Haxx
Haxx curl

Wed, 13 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 13 May 2026 15:30:00 +0000

Type Values Removed Values Added
References

Wed, 13 May 2026 09:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in libcurl. Due to a logical error in the connection reuse mechanism for SMB (Server Message Block) transfers, libcurl might reuse an existing SMB connection with a different share than intended. This vulnerability, categorized as CWE-488 (Exposure of Data Element to Wrong Session), could lead to the download of an incorrect file or the upload of a file to an unintended location when an application uses libcurl for SMB transfers. libcurl might in some circumstances reuse the wrong connection for SMB(S) transfers. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criteria must be met. Due to a logical error in the code, a network transfer operation that was requested by an application could wrongfully reuse an existing SMB connection to the same server that was using a different 'share' than the new subsequent transfer should. This could in unlucky situations lead to the download of the wrong file or the upload of a file to the wrong place. When this happens, the same credentials are used and the server name is the same.
Title curl: libcurl: Wrong file transfer due to incorrect SMB connection reuse wrong reuse of SMB connection
References

Fri, 01 May 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Curl
Curl libcurl
Vendors & Products Curl
Curl libcurl

Fri, 01 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in libcurl. Due to a logical error in the connection reuse mechanism for SMB (Server Message Block) transfers, libcurl might reuse an existing SMB connection with a different share than intended. This vulnerability, categorized as CWE-488 (Exposure of Data Element to Wrong Session), could lead to the download of an incorrect file or the upload of a file to an unintended location when an application uses libcurl for SMB transfers.
Title curl: libcurl: Wrong file transfer due to incorrect SMB connection reuse
Weaknesses CWE-1025
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2026-05-13T17:45:08.173Z

Reserved: 2026-04-08T06:51:05.356Z

Link: CVE-2026-5773

cve-icon Vulnrichment

Updated: 2026-05-13T09:05:23.608Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-13T13:01:56.307

Modified: 2026-05-13T19:13:14.097

Link: CVE-2026-5773

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-29T00:00:00Z

Links: CVE-2026-5773 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T21:15:04Z

Weaknesses