curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
{
"URL": "https://curl.se/docs/CVE-2025-10966.json",
"www": "https://curl.se/docs/CVE-2025-10966.html",
"CWE": {
"desc": "Key Exchange without Entity Authentication",
"id": "CWE-322"
},
"package": "curl",
"last_affected": "8.16.0",
"issue": "https://hackerone.com/reports/3355218",
"affects": "both",
"severity": "Low",
"award": {
"amount": "505",
"currency": "USD"
}
}