CVE-2025-5399

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-5399
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5399.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-5399
Aliases
Downstream
Related
Published
2025-06-07T08:15:20Z
Modified
2025-10-10T05:11:45.485986Z
Summary
[none]
Details

Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop.

There is no other way for the application to escape or exit this loop other than killing the thread/process.

This might be used to DoS libcurl-using application.

References

Affected packages

Git / github.com/curl/curl

Affected ranges

Type
GIT
Repo
https://github.com/curl/curl
Events

Affected versions

Other

curl-8_13_0
curl-8_14_0