Vulnerability Description
When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haxx | Curl | >= 8.17.0, < 8.20.0 |
Related Weaknesses (CWE)
References
- https://curl.se/docs/CVE-2026-7009.htmlPatchVendor Advisory
- https://curl.se/docs/CVE-2026-7009.jsonProduct
- https://hackerone.com/reports/3694390ExploitIssue TrackingPatch
- http://www.openwall.com/lists/oss-security/2026/04/29/12Mailing ListPatchThird Party Advisory
- https://hackerone.com/reports/3694390ExploitIssue TrackingPatch
FAQ
What is CVE-2026-7009?
CVE-2026-7009 is a vulnerability with a CVSS score of 5.3 (MEDIUM). When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instea...
How severe is CVE-2026-7009?
CVE-2026-7009 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7009?
Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl.