CVE-2023-27538
MySQL vulnerability analysis and mitigation

Overview

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings (CURLOPTSSHPUBLICKEYFILE and CURLOPTSSHPRIVATEKEYFILE) were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. This flaw was initially introduced in curl 7.16.1 (Curl Docs).

Technical details

The vulnerability affects libcurl versions from 7.16.1 to 7.88.1. The issue stems from the connection pooling mechanism where previously used connections are kept for reuse if they match the current setup. The vulnerability specifically relates to two SSH settings that were not properly checked during connection matching. The CVSS v3.1 base score is 5.5 (MEDIUM) with a vector of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This vulnerability is classified as CWE-305: Authentication Bypass by Primary Weakness and is partially identical to CVE-2022-27782 (NVD, NetApp Advisory).

Impact

The vulnerability could lead to the reuse of an inappropriate connection, potentially resulting in unauthorized access to sensitive information. The severity is considered Low to Medium, as it affects only two options that rarely change with the expectation that the user is different (Curl Docs).

Mitigation and workarounds

The vulnerability has been fixed in curl version 8.0.0. Users are recommended to upgrade to this version or later. For systems that cannot be immediately upgraded, avoiding SCP and SFTP transfers can serve as a temporary workaround (Debian LTS, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related MySQL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-53032MEDIUM4.9
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql_server
NoNoJul 15, 2025
CVE-2025-53023MEDIUM4.9
  • MySQLMySQL
  • mysql-8.0
NoYesJul 15, 2025
CVE-2025-50102MEDIUM4.9
  • MySQLMySQL
  • mysql:8.0::mecab-devel
NoYesJul 15, 2025
CVE-2025-50103MEDIUM4.4
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql
NoNoJul 15, 2025
CVE-2025-50104LOW2.7
  • MySQLMySQL
  • mysql:8.4::mysql-test
NoYesJul 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management