Home

Description

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.

PUBLISHED Reserved 2026-03-23 | Published 2026-04-06 | Updated 2026-04-06 | Assigner GitHub_M




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 0.15.0
affected

References

github.com/...l_cffi/security/advisories/GHSA-qw2m-4pqf-rmpp exploit

github.com/...l_cffi/security/advisories/GHSA-qw2m-4pqf-rmpp

cve.org (CVE-2026-33752)

nvd.nist.gov (CVE-2026-33752)

Download JSON