An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPTFTPACCOUNT, CURLOPTFTPALTERNATIVETOUSER, CURLOPTFTPSSLCCC, and CURLOPTUSE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
{
"license": "CC-BY-4.0",
"sources": [
{
"id": "CVE-2023-27535",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-27535",
"published": "2023-03-30T20:15:07.483Z",
"imported": "2025-10-10T14:33:22.320Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27535",
"modified": "2025-06-09T15:15:28.903Z"
}
]
}