CVE-2025-9086
Published:September 12, 2025
Updated:May 16, 2026
1. A cookie is set using the "secure" keyword for "https://target"
2. curl is redirected to or otherwise made to speak with "http://target" (same
hostname, but using clear text HTTP) using the same cookie set
3. The same cookie name is set - but with just a slash as path ("path=\"/\",").
Since this site is not secure, the cookie should just be ignored.
4. A bug in the path comparison logic makes curl read outside a heap buffer
boundary
The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.
Affected Packages
libcurl (CONAN):
Affected version(s) >=7.76.0 <=8.15.0Fix Suggestion:
Update to version no_fixhttps://github.com/curl/curl.git (GITHUB):
Affected version(s) >=curl-7_31_0 <curl-8_16_0Fix Suggestion:
Update to version curl-8_16_0Additional Notes
The description of this vulnerability differs from MITRE.
Related Resources (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Out-of-bounds Read
EPSS
Base Score:
0.06