When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`
with the curl tool,curl should check the public key of the server certificate
to verify the peer.
This check was skipped in a certain condition that would then make curl allow
the connection without performing the proper check, thus not noticing a
possible impostor. To skip this check, the connection had to be done with QUIC
with ngtcp2 built to use GnuTLS and the user had to explicitly disable the
standard certificate verification.
Metrics
Affected Vendors & Products
References
History
Thu, 08 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-295 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification. | |
| Title | No QUIC certificate pinning with GnuTLS | |
| References |
|
Status: PUBLISHED
Assigner: curl
Published:
Updated: 2026-01-08T14:58:20.565Z
Reserved: 2025-11-11T16:52:22.121Z
Link: CVE-2025-13034
Updated: 2026-01-08T14:57:30.418Z
Status : Awaiting Analysis
Published: 2026-01-08T10:15:45.407
Modified: 2026-01-08T18:08:18.457
Link: CVE-2025-13034
No data.
OpenCVE Enrichment
No data.