CVE-2026-4873: TLS Bypass in curl 8.12.0–8.19.0

Plattform

curl

Komponente

curl

Behoben in

8.19.1

CVE-2026-4873 describes a TLS bypass vulnerability discovered in curl versions 8.12.0 through 8.19.0. This flaw allows attackers to circumvent TLS encryption by exploiting connection reuse within the curl connection pool. The vulnerability arises when an initial connection is established in cleartext (e.g., via IMAP, SMTP, or POP3), and subsequent requests to the same host bypass TLS. A fix is available in curl 8.19.1.

Auswirkungen und Angriffsszenarien

The impact of CVE-2026-4873 is significant, as it allows for the interception and modification of sensitive data transmitted over seemingly secure connections. An attacker who can control the initial connection establishment can force curl to reuse an unencrypted connection, enabling them to eavesdrop on or manipulate subsequent data transfers. This could lead to the exposure of credentials, personal information, or other confidential data. The vulnerability is particularly concerning for applications that rely on curl for secure communication with external services, such as automated scripts, CI/CD pipelines, and web applications. The ability to bypass TLS encryption effectively negates the security benefits of using HTTPS, rendering the connection vulnerable to man-in-the-middle attacks.

Ausnutzungskontext

CVE-2026-4873 is currently not listed on KEV (Kernel Exploitability Vulnerability) or EPSS (Exploit Prediction Scoring System). The CVSS score is pending evaluation. As of the publication date (2026-05-13), no public proof-of-concept (POC) exploits have been publicly disclosed. There are no reports of active campaigns exploiting this vulnerability. Refer to the official curl security advisory for further details.

Bedrohungsanalyse

Exploit-Status

Proof of ConceptUnbekannt
CISA KEVNO

EPSS

0.01% (2% Perzentil)

Betroffene Software

Komponentecurl
Herstellercurl
Mindestversion8.12.0
Höchstversion8.19.0
Behoben in8.19.1

Schwachstellen-Klassifikation (CWE)

Zeitleiste

  1. Reserviert
  2. Veröffentlicht
  3. EPSS aktualisiert

Mitigation und Workarounds

The primary mitigation for CVE-2026-4873 is to upgrade to curl version 8.19.1 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. One approach is to disable connection reuse within curl by setting the --resolve option to explicitly specify the hostname and IP address for each connection. Another workaround involves carefully reviewing and restricting the protocols used by curl to avoid establishing initial cleartext connections. Web application firewalls (WAFs) or proxies can be configured to inspect traffic for suspicious patterns indicative of this exploitation, although this is a less reliable solution. After upgrading, confirm the fix by running curl with TLS enabled and verifying that the connection is properly encrypted using a network analysis tool like Wireshark.

So behebenwird übersetzt…

Actualice a la versión 8.19.1 o superior de curl para evitar la reutilización incorrecta de conexiones que ignora los requisitos de TLS. Esto asegura que las comunicaciones se cifren adecuadamente, protegiendo la confidencialidad de los datos transmitidos.

Häufig gestellte Fragen

What is CVE-2026-4873 — TLS Bypass in curl?

CVE-2026-4873 is a vulnerability in curl versions 8.12.0 through 8.19.0 that allows attackers to bypass TLS encryption by reusing unencrypted connections. This can lead to data interception and modification.

Am I affected by CVE-2026-4873 in curl?

You are affected if you are using curl versions 8.12.0 through 8.19.0. Upgrade to version 8.19.1 or later to mitigate the risk.

How do I fix CVE-2026-4873 in curl?

The recommended fix is to upgrade to curl version 8.19.1 or later. As a temporary workaround, disable connection reuse or restrict protocols to avoid cleartext connections.

Is CVE-2026-4873 being actively exploited?

As of the publication date, there are no reports of active exploitation or publicly available proof-of-concept exploits for CVE-2026-4873.

Where can I find the official curl advisory for CVE-2026-4873?

Refer to the official curl security advisory, which will be published on the curl project website (https://curl.se/security/) once available.

Ist dein Projekt betroffen?

Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.

liveKostenloser Scan

Jetzt testen — kein Konto

Laden Sie ein Manifest hoch (composer.lock, package-lock.json, WordPress Plugin-Liste…) oder fügen Sie Ihre Komponentenliste ein. Sie erhalten sofort einen Schwachstellenbericht. Das Hochladen einer Datei ist nur der Anfang: Mit einem Konto erhalten Sie kontinuierliche Überwachung, Slack/email-Benachrichtigungen, Multi-Projekt- und White-Label-Berichte.

Manueller ScanSlack/E-Mail-AlertsKontinuierliche ÜberwachungWhite-Label-Berichte

Abhängigkeitsdatei hier ablegen

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...