Description
A flaw was found in libcurl. When configured to use a .netrc file for credentials and follow HTTP redirects, libcurl can inadvertently send the password from the initial connection to the redirected host. This sensitive information disclosure occurs when both the original and redirect URLs use clear text HTTP, are performed over the same HTTP proxy, and the same connection is reused. This vulnerability, categorized as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200), could allow an attacker to obtain user credentials.
Published: n/a
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in libcurl allows credentials stored in a .netrc file to be unintentionally sent to a redirected host when both the initial and redirected URLs use clear text HTTP, share the same HTTP proxy, and the connection is reused. The vulnerability, categorized as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-201), results in the accidental transmission of user passwords over the network, exposing sensitive authentication data to an unauthorized actor and enabling credential theft.

Affected Systems

The vulnerability affects libcurl and any applications that rely on it (such as the command-line tool) when configured to use .netrc credentials and automatic HTTP redirects. All builds of libcurl that support .netrc file usage and do not enforce isolation between proxy connections before the fix are potentially impacted. Specific version details are not listed, so all pre‑fix releases should be considered vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity threat. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited. The attack requires an attacker to control or observe a clear text HTTP proxy that the user employs for both the original and the redirected request. In scenarios where an attacker can see the proxy traffic or coerce a user to route traffic through a malicious proxy, credential leakage can occur. Although the conditions for exploitation are relatively specific, the potential impact of credential theft warrants proactive mitigation.

Generated by OpenCVE AI on May 2, 2026 at 12:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade libcurl to the latest release that resolves the .netrc reuse issue.
  • Configure the application to avoid using .netrc for authentication or to enforce HTTPS for all HTTP redirects.
  • Disable or restrict proxy reuse for redirects by setting libcurl options to enforce a new connection for each redirected request.

Generated by OpenCVE AI on May 2, 2026 at 12:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Curl
Curl libcurl
Vendors & Products Curl
Curl libcurl

Fri, 01 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in libcurl. When configured to use a .netrc file for credentials and follow HTTP redirects, libcurl can inadvertently send the password from the initial connection to the redirected host. This sensitive information disclosure occurs when both the original and redirect URLs use clear text HTTP, are performed over the same HTTP proxy, and the same connection is reused. This vulnerability, categorized as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200), could allow an attacker to obtain user credentials.
Title curl: libcurl: Credential leak via reused proxy connection during HTTP redirects
Weaknesses CWE-201
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


cve-icon MITRE

No data.

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-29T00:00:00Z

Links: CVE-2026-6429 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T12:45:42Z

Weaknesses