{"id":"CVE-2025-10966","summary":"missing SFTP host verification with wolfSSH","details":"curl's code for managing SSH connections when SFTP was done using the wolfSSH\npowered backend was flawed and missed host verification mechanisms.\n\nThis prevents curl from detecting MITM attackers and more.","aliases":["CURL-CVE-2025-10966"],"modified":"2026-05-18T05:59:08.091760492Z","published":"2025-11-07T07:26:30.351Z","related":["openSUSE-SU-2025:15757-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/10xxx/CVE-2025-10966.json","unresolved_ranges":[{"extracted_events":[{"last_affected":"8.16.0"},{"last_affected":"8.15.0"},{"last_affected":"8.14.1"},{"last_affected":"8.14.0"},{"last_affected":"8.13.0"},{"last_affected":"8.12.1"},{"last_affected":"8.12.0"},{"last_affected":"8.11.1"},{"last_affected":"8.11.0"},{"last_affected":"8.10.1"},{"last_affected":"8.10.0"},{"last_affected":"8.9.1"},{"last_affected":"8.9.0"},{"last_affected":"8.8.0"},{"last_affected":"8.7.1"},{"last_affected":"8.7.0"},{"last_affected":"8.6.0"},{"last_affected":"8.5.0"},{"last_affected":"8.4.0"},{"last_affected":"8.3.0"},{"last_affected":"8.2.1"},{"last_affected":"8.2.0"},{"last_affected":"8.1.2"},{"last_affected":"8.1.1"},{"last_affected":"8.1.0"},{"last_affected":"8.0.1"},{"last_affected":"8.0.0"},{"last_affected":"7.88.1"},{"last_affected":"7.88.0"},{"last_affected":"7.87.0"},{"last_affected":"7.86.0"},{"last_affected":"7.85.0"},{"last_affected":"7.84.0"},{"last_affected":"7.83.1"},{"last_affected":"7.83.0"},{"last_affected":"7.82.0"},{"last_affected":"7.81.0"},{"last_affected":"7.80.0"},{"last_affected":"7.79.1"},{"last_affected":"7.79.0"},{"last_affected":"7.78.0"},{"last_affected":"7.77.0"},{"last_affected":"7.76.1"},{"last_affected":"7.76.0"},{"last_affected":"7.75.0"},{"last_affected":"7.74.0"},{"last_affected":"7.73.0"},{"last_affected":"7.72.0"},{"last_affected":"7.71.1"},{"last_affected":"7.71.0"},{"last_affected":"7.70.0"},{"last_affected":"7.69.1"},{"last_affected":"7.69.0"}],"source":"AFFECTED_FIELD"}],"cna_assigner":"curl"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/11/05/2"},{"type":"WEB","url":"https://curl.se/docs/CVE-2025-10966.html"},{"type":"WEB","url":"https://curl.se/docs/CVE-2025-10966.json"},{"type":"WEB","url":"https://hackerone.com/reports/3355218"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/10xxx/CVE-2025-10966.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-10966"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/curl/curl","events":[{"introduced":"b8d1366852fd0034374c5de1e4968c7a224f77cc"},{"fixed":"400fffa90f30c7a2dc762fa33009d24851bd2016"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"7.69.0"},{"fixed":"8.17.0"}],"cpe":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"}}],"versions":["curl-8_16_0","curl-8_15_0","curl-8_14_1","curl-8_14_0","curl-8_13_0","curl-8_12_1","curl-8_12_0","curl-8_11_1","curl-8_11_0","curl-8_10_1","curl-8_10_0","curl-8_9_1","curl-8_9_0","curl-8_8_0","curl-8_7_1","curl-8_7_0","curl-8_6_0","curl-8_5_0","curl-8_4_0","curl-8_3_0","curl-8_2_1","curl-8_2_0","curl-8_1_2","curl-8_1_1","curl-8_1_0","curl-8_0_1","curl-8_0_0","curl-7_88_1","curl-7_88_0","curl-7_87_0","curl-7_86_0","curl-7_85_0","curl-7_84_0","curl-7_83_1","curl-7_83_0","curl-7_82_0","curl-7_81_0","curl-7_80_0","curl-7_79_1","curl-7_79_0","curl-7_78_0","curl-7_77_0","curl-7_76_1","curl-7_76_0","curl-7_75_0","curl-7_74_0","curl-7_73_0","curl-7_72_0","curl-7_71_1","curl-7_71_0","curl-7_70_0","curl-7_69_1","curl-7_69_0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-10966.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}