Description

curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.

INFO

Published Date :

2025-09-12T05:10:37.469Z

Last Modified :

2025-11-18T20:05:32.822Z

Source :

curl
AFFECTED PRODUCTS

The following products are affected by CVE-2025-10148 vulnerability.

Vendors Products
Curl
  • Curl
Haxx
  • Curl

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact