Description
curl might erroneously pass on credentials for a first proxy to a second
proxy.

This can happen when the following conditions are true:

1. curl is setup to use specific different proxies for different URL schemes
2. the first proxy needs credentials
3. the second proxy uses no credentials
4. while using the first proxy (using say `http://`), curl is asked to follow
a redirect to a URL using another scheme (say `https://`), accessed using a
second, different, proxy
Published: 2026-05-13
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability afflicts cURL, the popular command‑line tool and library for handling network requests. When cURL is configured to use distinct proxy servers for different URL schemes, a redirection that moves from a URL accessed through an authenticated proxy to a URL that uses an unauthenticated proxy can inadvertently leak the credentials of the original authenticated proxy. The CNA lists this weakness as both CWE‑201, a credential disclosure vulnerability, and CWE‑522, which highlights improper handling or storage of credentials. An attacker who can observe or influence the traffic generated by a configured curl instance could capture these credentials and use them to gain unauthorized network access or to learn sensitive configuration details.

Affected Systems

This flaw impacts all cURL installations—the command‑line tool and the libcurl library—regardless of platform, because no specific version numbers were supplied by the CNA. Given the absence of a version range, any release that still follows the legacy proxy handling model is potentially affected, until the issue is fixed in a newer version.

Risk and Exploitability

With a CVSS score of 5.9 the flaw is moderate in severity. The EPSS score is < 1% (0.00043) and the vulnerability is not listed in the CISA KEV catalog, indicating that broad exploitation is unlikely at present. The attack requires a curl configuration that uses separate proxies for different URL schemes and a subsequent redirect that changes the proxy context. Based on the description, the attacker must either monitor traffic to the curl instance or actively influence the redirect to capture the leaked credentials—a relatively constrained ad‑hoc scenario.

Generated by OpenCVE AI on May 14, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade cURL to the latest release that contains the credential‑redirection fix
  • Reconfigure cURL to employ a single proxy for all URL schemes or disable automatic redirects when the proxy setting changes
  • Enforce strict proxy authentication checks on the server side to reject any credentials forwarded to unauthenticated endpoints
  • Monitor outbound traffic for unexpected proxy headers or unauthorized redirects, and audit logs for credential leakage

Generated by OpenCVE AI on May 14, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8227-1 curl vulnerabilities
History

Thu, 14 May 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Haxx
Haxx curl
Weaknesses CWE-522
CPEs cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Vendors & Products Haxx
Haxx curl

Wed, 13 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Wed, 13 May 2026 15:30:00 +0000

Type Values Removed Values Added
References

Wed, 13 May 2026 09:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in curl. When curl is configured to use distinct proxies for different URL schemes, a redirect from a URL using an authenticated proxy to one using an unauthenticated proxy can inadvertently expose the initial proxy's credentials. This improper credential management (CWE-522) may allow an attacker to gain unauthorized access or information by intercepting these disclosed credentials. curl might erroneously pass on credentials for a first proxy to a second proxy. This can happen when the following conditions are true: 1. curl is setup to use specific different proxies for different URL schemes 2. the first proxy needs credentials 3. the second proxy uses no credentials 4. while using the first proxy (using say `http://`), curl is asked to follow a redirect to a URL using another scheme (say `https://`), accessed using a second, different, proxy
Title curl: curl: Proxy credential disclosure via redirects to unauthenticated proxies proxy credentials leak over redirect-to proxy
References

Fri, 01 May 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Curl
Curl curl
Vendors & Products Curl
Curl curl

Fri, 01 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in curl. When curl is configured to use distinct proxies for different URL schemes, a redirect from a URL using an authenticated proxy to one using an unauthenticated proxy can inadvertently expose the initial proxy's credentials. This improper credential management (CWE-522) may allow an attacker to gain unauthorized access or information by intercepting these disclosed credentials.
Title curl: curl: Proxy credential disclosure via redirects to unauthenticated proxies
Weaknesses CWE-201
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2026-05-13T17:42:40.102Z

Reserved: 2026-04-13T20:11:11.991Z

Link: CVE-2026-6253

cve-icon Vulnrichment

Updated: 2026-05-13T09:05:31.000Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-13T13:01:56.570

Modified: 2026-05-14T13:40:53.190

Link: CVE-2026-6253

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-29T00:00:00Z

Links: CVE-2026-6253 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T15:15:23Z

Weaknesses