CVE-2022-27780
Splunk Forwarder vulnerability analysis and mitigation

Overview

The curl URL parser vulnerability (CVE-2022-27780) was discovered in April 2022 and disclosed on May 11, 2022. The vulnerability affects curl versions 7.80.0 to 7.83.0. The issue occurs when the parser incorrectly accepts percent-encoded URL separators in the hostname part of a URL, leading to potential security bypasses (Curl Advisory).

Technical details

The vulnerability stems from a flaw introduced in commit 9a8564a920188e, which was shipped in curl 7.80.0 when curl added support for percent-encoded hostnames in URLs. The parser wrongly accepts percent-encoded URL separators like '/' when decoding the hostname part of a URL. For example, a URL like http://example.com%2F127.0.0.1/ would be allowed by the parser and get transposed into http://example.com/127.0.0.1/. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N (NVD, Curl Advisory).

Impact

This vulnerability can be exploited to circumvent filters and security checks. The flaw allows attackers to manipulate the hostname interpretation, potentially leading to security bypass scenarios. The primary impact is on the integrity of URL processing, with no direct impact on confidentiality or availability (Curl Advisory).

Mitigation and workarounds

The vulnerability was fixed in curl version 7.83.1, released on May 11, 2022. The fix involves modifying the URL parser to reject hostnames that percent-decode into URL separator characters. Users are recommended to upgrade to version 7.83.1 or later. If upgrading is not immediately possible, there are no known workarounds (Curl Advisory).

Additional resources


SourceThis report was generated using AI

Related Splunk Forwarder vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20298HIGH8
  • Splunk ForwarderSplunk Forwarder
  • cpe:2.3:a:splunk:universal_forwarder
NoYesJun 02, 2025
CVE-2023-27537MEDIUM5.9
  • MySQLMySQL
  • tensorflow
NoYesMar 30, 2023
CVE-2023-27536MEDIUM5.9
  • MySQLMySQL
  • curl-doc
NoYesMar 30, 2023
CVE-2023-27535MEDIUM5.9
  • MySQLMySQL
  • cpe:2.3:a:splunk:universal_forwarder
NoYesMar 30, 2023
CVE-2023-27538MEDIUM5.5
  • MySQLMySQL
  • curl-minimal
NoYesMar 30, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management