libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL.
Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3.
Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
{
"severity": "Medium",
"package": "curl",
"www": "https://curl.se/docs/CVE-2025-5025.html",
"URL": "https://curl.se/docs/CVE-2025-5025.json",
"issue": "https://hackerone.com/reports/3153497",
"last_affected": "8.13.0",
"award": {
"amount": "2540",
"currency": "USD"
},
"affects": "both",
"CWE": {
"id": "CWE-295",
"desc": "Improper Certificate Validation"
}
}