Improper Certificate Validation Affecting libcurl package, versions [7.87.0,8.18.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-LIBCURL-14908853
  • published9 Jan 2026
  • disclosed8 Jan 2026
  • creditStanislav Fort

Introduced: 8 Jan 2026

CVE-2025-14819  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade libcurl to version 8.18.0 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation in the handling of TLS transfers when reusing easy or multi handles and modifying the CURLSSLOPT_NO_PARTIALCHAIN option. An attacker can cause the application to accept an unintended trust chain by exploiting the reuse of a cached CA store with reversed partial chain settings.

Note:

This issue affects only users building libcurl with OpenSSL (or one of the many OpenSSL forks) in runtime.

CVSS Base Scores

version 4.0
version 3.1