CVE-2025-13034

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.
References
Link Resource
https://curl.se/docs/CVE-2025-13034.html Vendor Advisory Patch
https://curl.se/docs/CVE-2025-13034.json Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

History

20 Jan 2026, 14:54

Type Values Removed Values Added
References () https://curl.se/docs/CVE-2025-13034.html - () https://curl.se/docs/CVE-2025-13034.html - Vendor Advisory, Patch
References () https://curl.se/docs/CVE-2025-13034.json - () https://curl.se/docs/CVE-2025-13034.json - Vendor Advisory
First Time Haxx curl
Haxx
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

08 Jan 2026, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
CWE CWE-295

08 Jan 2026, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-08 10:15

Updated : 2026-01-20 14:54


NVD link : CVE-2025-13034

Mitre link : CVE-2025-13034

CVE.ORG link : CVE-2025-13034


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation