CVE-2025-10966
📋 TL;DR
CVE-2025-10966 is a vulnerability in curl's SSH connection management when using SFTP with the wolfSSH backend, where host verification mechanisms were missing. This allows man-in-the-middle (MITM) attackers to intercept and potentially modify SFTP connections without detection. Affected users are those using curl with SFTP via wolfSSH backend in vulnerable versions.
💻 Affected Systems
- curl
📦 What is this software?
Curl by Haxx
curl is a command-line tool and library for transferring data with URLs. It supports numerous protocols including HTTP, HTTPS, FTP, and more, making it essential for API testing, web scraping, and automated data transfers.
Learn more about Curl →⚠️ Risk & Real-World Impact
Worst Case
Attackers could intercept sensitive data transfers, inject malicious files, or redirect connections to malicious servers, potentially leading to data theft, malware deployment, or unauthorized access.
Likely Case
MITM attackers intercepting SFTP connections in untrusted networks could read or modify transferred files, compromising data integrity and confidentiality.
If Mitigated
With proper network segmentation, encrypted internal networks, and certificate pinning, the risk is reduced to minimal impact on isolated systems.
🎯 Exploit Status
Exploitation requires network access to intercept SFTP connections; no authentication bypass is involved.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: curl 8.11.0
Vendor Advisory: https://curl.se/docs/CVE-2025-10966.html
Restart Required: No
Instructions:
1. Update curl to version 8.11.0 or later. 2. On Linux/macOS, use package manager (e.g., apt-get upgrade curl, brew upgrade curl). 3. On Windows, download from official curl website. 4. Recompile applications if statically linked.
🔧 Temporary Workarounds
Use alternative SSH backend
allSwitch to using libssh or libssh2 backend for SFTP connections instead of wolfSSH.
curl --version to check backend
Recompile curl with different SSH backend if needed
Disable SFTP usage
allAvoid using SFTP protocol in curl commands where possible.
Replace SFTP URLs with HTTPS or other secure protocols
🧯 If You Can't Patch
- Restrict SFTP connections to trusted networks using firewalls or VPNs.
- Implement certificate pinning or use SSH keys with strict host checking in application code.
🔍 How to Verify
Check if Vulnerable:
Run 'curl --version' and check if version is between 8.9.0 and 8.10.0, and if wolfSSH backend is listed for SFTP.
Check Version:
curl --version | head -1
Verify Fix Applied:
After update, run 'curl --version' to confirm version is 8.11.0 or higher.
📡 Detection & Monitoring
Log Indicators:
- Unusual SFTP connection failures or warnings in curl logs
- Unexpected host key mismatches in SSH/SFTP logs
Network Indicators:
- Unencrypted or suspicious SFTP traffic patterns from curl processes
- MITM detection alerts from network monitoring tools
SIEM Query:
source="curl" AND (protocol="SFTP" OR port=22) AND version BETWEEN "8.9.0" AND "8.10.0"