libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
{
"cna_assigner": "curl",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/4xxx/CVE-2025-4947.json",
"unresolved_ranges": [
{
"source": "AFFECTED_FIELD",
"extracted_events": [
{
"last_affected": "8.13.0"
},
{
"last_affected": "8.12.1"
},
{
"last_affected": "8.12.0"
},
{
"last_affected": "8.11.1"
},
{
"last_affected": "8.11.0"
},
{
"last_affected": "8.10.1"
},
{
"last_affected": "8.10.0"
},
{
"last_affected": "8.9.1"
},
{
"last_affected": "8.9.0"
},
{
"last_affected": "8.8.0"
}
]
}
]
}