{"id":"UBUNTU-CVE-2025-14524","details":"When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.","modified":"2026-03-17T08:28:59.347549Z","published":"2026-01-06T07:00:00Z","related":["USN-8062-1"],"upstream":["CVE-2025-14524"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-14524"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2025-14524"},{"type":"REPORT","url":"https://curl.se/docs/CVE-2025-14524.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8062-1"}],"affected":[{"package":{"name":"curl","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/curl@7.35.0-1ubuntu2.20+esm19?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["7.32.0-1ubuntu1","7.33.0-1ubuntu1","7.34.0-1ubuntu1","7.35.0-1ubuntu1","7.35.0-1ubuntu2","7.35.0-1ubuntu2.1","7.35.0-1ubuntu2.2","7.35.0-1ubuntu2.3","7.35.0-1ubuntu2.5","7.35.0-1ubuntu2.6","7.35.0-1ubuntu2.7","7.35.0-1ubuntu2.8","7.35.0-1ubuntu2.9","7.35.0-1ubuntu2.10","7.35.0-1ubuntu2.11","7.35.0-1ubuntu2.12","7.35.0-1ubuntu2.13","7.35.0-1ubuntu2.14","7.35.0-1ubuntu2.15","7.35.0-1ubuntu2.16","7.35.0-1ubuntu2.17","7.35.0-1ubuntu2.19","7.35.0-1ubuntu2.20","7.35.0-1ubuntu2.20+esm2","7.35.0-1ubuntu2.20+esm3","7.35.0-1ubuntu2.20+esm4","7.35.0-1ubuntu2.20+esm5","7.35.0-1ubuntu2.20+esm6","7.35.0-1ubuntu2.20+esm7","7.35.0-1ubuntu2.20+esm8","7.35.0-1ubuntu2.20+esm9","7.35.0-1ubuntu2.20+esm10","7.35.0-1ubuntu2.20+esm11","7.35.0-1ubuntu2.20+esm12","7.35.0-1ubuntu2.20+esm13","7.35.0-1ubuntu2.20+esm14","7.35.0-1ubuntu2.20+esm15","7.35.0-1ubuntu2.20+esm16","7.35.0-1ubuntu2.20+esm17","7.35.0-1ubuntu2.20+esm18","7.35.0-1ubuntu2.20+esm19"],"ecosystem_specific":{"binaries":[{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"curl"},{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"libcurl3"},{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"libcurl3-gnutls"},{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"libcurl3-nss"},{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"libcurl4-nss-dev"},{"binary_version":"7.35.0-1ubuntu2.20+esm19","binary_name":"libcurl4-openssl-dev"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/curl@7.47.0-1ubuntu2.19+esm15?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["7.43.0-1ubuntu2","7.45.0-1ubuntu1","7.46.0-1ubuntu1","7.47.0-1ubuntu1","7.47.0-1ubuntu2","7.47.0-1ubuntu2.1","7.47.0-1ubuntu2.2","7.47.0-1ubuntu2.3","7.47.0-1ubuntu2.4","7.47.0-1ubuntu2.5","7.47.0-1ubuntu2.6","7.47.0-1ubuntu2.7","7.47.0-1ubuntu2.8","7.47.0-1ubuntu2.9","7.47.0-1ubuntu2.11","7.47.0-1ubuntu2.12","7.47.0-1ubuntu2.13","7.47.0-1ubuntu2.14","7.47.0-1ubuntu2.15","7.47.0-1ubuntu2.16","7.47.0-1ubuntu2.18","7.47.0-1ubuntu2.19","7.47.0-1ubuntu2.19+esm1","7.47.0-1ubuntu2.19+esm2","7.47.0-1ubuntu2.19+esm3","7.47.0-1ubuntu2.19+esm4","7.47.0-1ubuntu2.19+esm5","7.47.0-1ubuntu2.19+esm6","7.47.0-1ubuntu2.19+esm7","7.47.0-1ubuntu2.19+esm8","7.47.0-1ubuntu2.19+esm9","7.47.0-1ubuntu2.19+esm10","7.47.0-1ubuntu2.19+esm11","7.47.0-1ubuntu2.19+esm12","7.47.0-1ubuntu2.19+esm13","7.47.0-1ubuntu2.19+esm15"],"ecosystem_specific":{"binaries":[{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"curl"},{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"libcurl3"},{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"libcurl3-gnutls"},{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"libcurl3-nss"},{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"libcurl4-nss-dev"},{"binary_version":"7.47.0-1ubuntu2.19+esm15","binary_name":"libcurl4-openssl-dev"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/curl@7.58.0-2ubuntu3.24+esm8?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["7.55.1-1ubuntu2","7.55.1-1ubuntu2.1","7.57.0-1ubuntu1","7.58.0-2ubuntu1","7.58.0-2ubuntu2","7.58.0-2ubuntu3","7.58.0-2ubuntu3.1","7.58.0-2ubuntu3.2","7.58.0-2ubuntu3.3","7.58.0-2ubuntu3.5","7.58.0-2ubuntu3.6","7.58.0-2ubuntu3.7","7.58.0-2ubuntu3.8","7.58.0-2ubuntu3.9","7.58.0-2ubuntu3.10","7.58.0-2ubuntu3.12","7.58.0-2ubuntu3.13","7.58.0-2ubuntu3.14","7.58.0-2ubuntu3.15","7.58.0-2ubuntu3.16","7.58.0-2ubuntu3.17","7.58.0-2ubuntu3.18","7.58.0-2ubuntu3.19","7.58.0-2ubuntu3.20","7.58.0-2ubuntu3.21","7.58.0-2ubuntu3.22","7.58.0-2ubuntu3.23","7.58.0-2ubuntu3.24","7.58.0-2ubuntu3.24+esm1","7.58.0-2ubuntu3.24+esm2","7.58.0-2ubuntu3.24+esm3","7.58.0-2ubuntu3.24+esm4","7.58.0-2ubuntu3.24+esm5","7.58.0-2ubuntu3.24+esm7","7.58.0-2ubuntu3.24+esm8"],"ecosystem_specific":{"binaries":[{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"curl"},{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"libcurl3-gnutls"},{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"libcurl3-nss"},{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"libcurl4"},{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"libcurl4-nss-dev"},{"binary_version":"7.58.0-2ubuntu3.24+esm8","binary_name":"libcurl4-openssl-dev"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/curl@7.68.0-1ubuntu2.25+esm3?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["7.65.3-1ubuntu3","7.65.3-1ubuntu4","7.66.0-1ubuntu1","7.67.0-2ubuntu1","7.68.0-1ubuntu1","7.68.0-1ubuntu2","7.68.0-1ubuntu2.1","7.68.0-1ubuntu2.2","7.68.0-1ubuntu2.4","7.68.0-1ubuntu2.5","7.68.0-1ubuntu2.6","7.68.0-1ubuntu2.7","7.68.0-1ubuntu2.10","7.68.0-1ubuntu2.11","7.68.0-1ubuntu2.12","7.68.0-1ubuntu2.13","7.68.0-1ubuntu2.14","7.68.0-1ubuntu2.15","7.68.0-1ubuntu2.16","7.68.0-1ubuntu2.18","7.68.0-1ubuntu2.19","7.68.0-1ubuntu2.20","7.68.0-1ubuntu2.21","7.68.0-1ubuntu2.22","7.68.0-1ubuntu2.23","7.68.0-1ubuntu2.24","7.68.0-1ubuntu2.25","7.68.0-1ubuntu2.25+esm2","7.68.0-1ubuntu2.25+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"curl"},{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"libcurl3-gnutls"},{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"libcurl3-nss"},{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"libcurl4"},{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"libcurl4-nss-dev"},{"binary_version":"7.68.0-1ubuntu2.25+esm3","binary_name":"libcurl4-openssl-dev"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/curl@7.81.0-1ubuntu1.22?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.81.0-1ubuntu1.22"}]}],"versions":["7.74.0-1.3ubuntu2","7.74.0-1.3ubuntu3","7.80.0-3","7.81.0-1","7.81.0-1ubuntu1.1","7.81.0-1ubuntu1.2","7.81.0-1ubuntu1.3","7.81.0-1ubuntu1.4","7.81.0-1ubuntu1.6","7.81.0-1ubuntu1.7","7.81.0-1ubuntu1.8","7.81.0-1ubuntu1.10","7.81.0-1ubuntu1.11","7.81.0-1ubuntu1.13","7.81.0-1ubuntu1.14","7.81.0-1ubuntu1.15","7.81.0-1ubuntu1.16","7.81.0-1ubuntu1.17","7.81.0-1ubuntu1.18","7.81.0-1ubuntu1.19","7.81.0-1ubuntu1.20","7.81.0-1ubuntu1.21"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"curl"},{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"libcurl3-gnutls"},{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"libcurl3-nss"},{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"libcurl4"},{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"libcurl4-nss-dev"},{"binary_version":"7.81.0-1ubuntu1.22","binary_name":"libcurl4-openssl-dev"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/curl@8.5.0-2ubuntu10.7?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.5.0-2ubuntu10.7"}]}],"versions":["8.2.1-1ubuntu3","8.2.1-1ubuntu3.1","8.4.0-2ubuntu1","8.5.0-2ubuntu1","8.5.0-2ubuntu2","8.5.0-2ubuntu8","8.5.0-2ubuntu9","8.5.0-2ubuntu10","8.5.0-2ubuntu10.1","8.5.0-2ubuntu10.2","8.5.0-2ubuntu10.3","8.5.0-2ubuntu10.4","8.5.0-2ubuntu10.5","8.5.0-2ubuntu10.6"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"8.5.0-2ubuntu10.7","binary_name":"curl"},{"binary_version":"8.5.0-2ubuntu10.7","binary_name":"libcurl3t64-gnutls"},{"binary_version":"8.5.0-2ubuntu10.7","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"8.5.0-2ubuntu10.7","binary_name":"libcurl4-openssl-dev"},{"binary_version":"8.5.0-2ubuntu10.7","binary_name":"libcurl4t64"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/curl@8.14.1-2ubuntu1.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.14.1-2ubuntu1.1"}]}],"versions":["8.12.1-3ubuntu1","8.13.0-5ubuntu1","8.14.1-1ubuntu2","8.14.1-1ubuntu3","8.14.1-2ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"8.14.1-2ubuntu1.1","binary_name":"curl"},{"binary_version":"8.14.1-2ubuntu1.1","binary_name":"libcurl3t64-gnutls"},{"binary_version":"8.14.1-2ubuntu1.1","binary_name":"libcurl4-gnutls-dev"},{"binary_version":"8.14.1-2ubuntu1.1","binary_name":"libcurl4-openssl-dev"},{"binary_version":"8.14.1-2ubuntu1.1","binary_name":"libcurl4t64"}],"priority_reason":"This is rated as being low severity by Curl developers"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-14524.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}