libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
{
"license": "CC-BY-4.0",
"sources": [
{
"database_specific": {
"status": "Analyzed"
},
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5025",
"id": "CVE-2025-5025",
"imported": "2026-05-02T08:39:49.325Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5025",
"modified": "2025-07-30T19:41:37.987Z",
"published": "2025-05-28T07:15:24.910Z"
},
{
"imported": "2026-05-02T08:42:49.199Z",
"published": "2025-05-28T09:31:26Z",
"url": "https://api.github.com/advisories/GHSA-x8ch-h5vv-q6cm",
"id": "GHSA-x8ch-h5vv-q6cm",
"modified": "2025-07-30T21:32:41Z",
"html_url": "https://github.com/advisories/GHSA-x8ch-h5vv-q6cm"
},
{
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-16332",
"id": "EUVD-2025-16332",
"imported": "2026-05-02T08:42:19Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2025-16332",
"modified": "2025-05-30T16:19:53Z",
"published": "2025-05-28T06:29:51Z"
}
]
}