CVE-2025-14524

MEDIUM
2026-01-08 2499f714-1537-4658-8207-48ae4bb9eae9
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Jan 20, 2026 - 14:53 vuln.today
Public exploit code
Patch Released
Jan 20, 2026 - 14:53 nvd
Patch available
CVE Published
Jan 08, 2026 - 10:15 nvd
MEDIUM 5.3

Description

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

Analysis

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. [CVSS 5.3 MEDIUM]

Technical Context

Classified as CWE-601 (URL Redirection to Untrusted Site (Open Redirect)). Affects Curl. When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer

performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,

POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new

target host.

Affected Products

Vendor: Haxx. Product: Curl.

Remediation

A vendor patch is available — apply it immediately. Restrict network access to the affected service where possible.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: +20

Vendor Status

Share

CVE-2025-14524 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy