CVE-2026-7009

medium

Description

When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.

References

https://hackerone.com/reports/3694390

https://curl.se/docs/CVE-2026-7009.json

https://curl.se/docs/CVE-2026-7009.html

http://www.openwall.com/lists/oss-security/2026/04/29/12

Details

Source: Mitre, NVD

Published: 2026-05-13

Updated: 2026-05-14

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Severity: Medium

EPSS

EPSS: 0.00009