When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
{
"sources": [
{
"published": "2026-01-08T10:15:46.607Z",
"modified": "2026-01-20T14:53:11.017Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-14524",
"id": "CVE-2025-14524",
"imported": "2026-05-02T08:39:49.938Z",
"database_specific": {
"status": "Analyzed"
},
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524"
},
{
"published": "2026-01-08T12:30:29Z",
"modified": "2026-01-20T15:34:14Z",
"url": "https://api.github.com/advisories/GHSA-g897-jvjx-78vg",
"id": "GHSA-g897-jvjx-78vg",
"imported": "2026-05-02T08:42:44.443Z",
"html_url": "https://github.com/advisories/GHSA-g897-jvjx-78vg"
},
{
"published": "2026-01-08T10:07:25Z",
"modified": "2026-04-02T13:20:16Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2026-1582",
"id": "EUVD-2026-1582",
"imported": "2026-05-02T08:40:06.674Z",
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-1582"
}
],
"license": "CC-BY-4.0"
}