CVE-2026-3783

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host also to the second one.
References
Link Resource
https://curl.se/docs/CVE-2026-3783.html Patch Vendor Advisory
https://curl.se/docs/CVE-2026-3783.json Vendor Advisory
https://hackerone.com/reports/3583983 Exploit Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2026/03/11/2 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-11 11:16

Updated : 2026-03-12 14:10


NVD link : CVE-2026-3783

Mitre link : CVE-2026-3783

CVE.ORG link : CVE-2026-3783


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-522

Insufficiently Protected Credentials