Vulnerability Description
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Curl | >= 7.58.0, < 8.18.0 |
Related Weaknesses (CWE)
References
- https://curl.se/docs/CVE-2025-15224.htmlVendor AdvisoryPatch
- https://curl.se/docs/CVE-2025-15224.jsonVendor Advisory
- https://hackerone.com/reports/3480925ExploitThird Party AdvisoryIssue Tracking
- http://www.openwall.com/lists/oss-security/2026/01/07/7Mailing ListThird Party AdvisoryPatch
FAQ
What is CVE-2025-15224?
CVE-2025-15224 is a vulnerability with a CVSS score of 3.1 (LOW). When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
How severe is CVE-2025-15224?
CVE-2025-15224 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15224?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl.