Vulnerability CVE-2025-14524: Information
Description
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
Severity: MEDIUM (5.3)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
|---|---|---|---|---|---|---|
| curl | sisyphus | 8.18.0-alt1 | 8.18.0-alt1 | ALT-PU-2026-1133-1 | 404633 | Fixed |
| curl | sisyphus_riscv64 | 8.18.0-alt1 | 8.18.0-alt1 | ALT-PU-2026-1147-1 | - | Fixed |
| curl | sisyphus_loongarch64 | 8.18.0-alt1 | 8.18.0-alt1 | ALT-PU-2026-1153-1 | - | Fixed |
| curl | p11 | 8.18.0-alt1 | 8.18.0-alt1 | ALT-PU-2026-1135-2 | 404638 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
|---|---|
| https://curl.se/docs/CVE-2025-14524.html |
|
| https://curl.se/docs/CVE-2025-14524.json |
|
| https://hackerone.com/reports/3459417 |
|
| http://www.openwall.com/lists/oss-security/2026/01/07/4 |
|