powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 00:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haxx
Haxx curl |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haxx
Haxx curl |
Tue, 11 Nov 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Mon, 10 Nov 2025 18:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Curl
Curl curl |
|
| Vendors & Products |
Curl
Curl curl |
Sat, 08 Nov 2025 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-322 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 07 Nov 2025 17:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 07 Nov 2025 16:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more. | |
| Title | missing SFTP host verification with wolfSSH | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: curl
Published:
Updated: 2025-11-10T20:26:07.282Z
Reserved: 2025-09-25T10:15:10.502Z
Link: CVE-2025-10966
Updated: 2025-11-07T08:05:50.150Z
Status : Analyzed
Published: 2025-11-07T08:15:39.617
Modified: 2026-01-20T14:57:03.173
Link: CVE-2025-10966
OpenCVE Enrichment
Updated: 2025-11-10T18:34:48Z