This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains.
It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with domain=co.UK when the URL used a lower
case hostname curl.co.uk, even though co.uk is listed as a PSL domain.
{
"license": "CC-BY-4.0",
"sources": [
{
"modified": "2025-06-30T17:15:29.967Z",
"imported": "2026-05-02T08:39:47.905Z",
"database_specific": {
"status": "Modified"
},
"published": "2023-12-07T01:15:07.160Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46218",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-46218",
"id": "CVE-2023-46218"
},
{
"modified": "2025-06-30T18:32:42Z",
"imported": "2026-05-02T08:42:51.351Z",
"html_url": "https://github.com/advisories/GHSA-59mm-6rr4-j9p2",
"published": "2023-12-07T03:30:32Z",
"url": "https://api.github.com/advisories/GHSA-59mm-6rr4-j9p2",
"id": "GHSA-59mm-6rr4-j9p2"
},
{
"modified": "2025-06-30T16:20:37Z",
"imported": "2026-05-02T08:42:03.310Z",
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-50460",
"published": "2023-12-07T01:10:34Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2023-50460",
"id": "EUVD-2023-50460"
}
]
}