Impact
A flaw in libcurl’s handling of custom Host headers allows a cookie associated with one domain to be sent to a second domain if the same easy handle is reused and the custom Host header is omitted on the second request. The flaw results from stale header state being carried over, causing libcurl to transmit the original host’s cookies to the new host, thereby exposing session identifiers and other cookie‑based secrets. This breach is classified as a cookie leakage vulnerability (CWE‑346) and involves cleartext transmission of sensitive information due to insecure handling of host headers (CWE‑319).
Affected Systems
The vulnerability affects applications that embed or link against the libcurl library, including the command‑line curl client and other software that uses libcurl for HTTP requests. Any installation of libcurl that has not applied the documented fix for CVE‑2026‑6276 is potentially vulnerable; no specific product or version constraints are listed by the CNA.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. The EPSS score of less than 1 % and the absence from the CISA KEV catalog suggest low likelihood of widespread exploitation. However, the attack can be performed in normal usage when an application reuses connections with differing Host headers, so confirmation of usage patterns and code paths is warranted. Based on the description, it is inferred that the attacker must control the application’s request flow to set and then omit a custom Host header within the same easy handle, implying local code or a privileged exploit is required, but the impact remains significant if achieved.
OpenCVE Enrichment
Ubuntu USN