When curl is told to use the Certificate Status Request TLS extension, often
referred to as *OCSP stapling*, to verify that the server certificate is
valid, it fails to detect OCSP problems and instead wrongly consider the
response as fine.
referred to as *OCSP stapling*, to verify that the server certificate is
valid, it fails to detect OCSP problems and instead wrongly consider the
response as fine.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 May 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Curl
Curl curl |
|
| Weaknesses | CWE-200 CWE-284 |
|
| Vendors & Products |
Curl
Curl curl |
Wed, 13 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine. | |
| Title | OCSP stapling bypass with Apple SecTrust | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: curl
Published:
Updated: 2026-05-13T14:20:33.908Z
Reserved: 2026-04-25T08:37:24.989Z
Link: CVE-2026-7009
No data.
Status : Undergoing Analysis
Published: 2026-05-13T13:01:57.100
Modified: 2026-05-13T16:17:02.257
Link: CVE-2026-7009
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:30:16Z