performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,
POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new
target host.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 00:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haxx
Haxx curl |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haxx
Haxx curl |
Sat, 10 Jan 2026 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 09 Jan 2026 22:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Curl
Curl curl |
|
| Vendors & Products |
Curl
Curl curl |
Thu, 08 Jan 2026 20:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 08 Jan 2026 19:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. | |
| Title | bearer token leak on cross-protocol redirect | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: curl
Published:
Updated: 2026-01-09T19:25:30.460Z
Reserved: 2025-12-11T08:04:14.328Z
Link: CVE-2025-14524
Updated: 2026-01-08T11:06:18.117Z
Status : Analyzed
Published: 2026-01-08T10:15:46.607
Modified: 2026-01-20T14:53:11.017
Link: CVE-2025-14524
No data.
OpenCVE Enrichment
Updated: 2026-01-09T22:25:25Z