CVE-2025-10148
cURL vulnerability analysis and mitigation

Overview

CVE-2025-10148 is a vulnerability in curl's WebSocket implementation discovered in September 2025. The vulnerability affects curl versions 8.11.0 through 8.15.0, where the WebSocket code failed to update the 32-bit mask pattern for each new outgoing frame as required by the specification, instead using a fixed mask throughout the entire connection (Curl Advisory).

Technical details

The vulnerability stems from curl's WebSocket implementation not following RFC 6455 specifications regarding mask pattern updates. Instead of generating a new mask for each outgoing frame, it reused a fixed mask pattern throughout the connection. This issue is classified as CWE-340: Generation of Predictable Numbers or Identifiers. The vulnerability has been assigned a CVSS 3.1 Base Score of 5.3 (Medium) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).

Impact

The predictable mask pattern enables a malicious server to induce traffic between communicating parties that could be interpreted by an intermediary proxy (configured or transparent) as genuine HTTP traffic. This could lead to cache poisoning, where the compromised content would be served to all users of that proxy. The impact is particularly significant when using clear text HTTP/WebSocket (ws://) rather than secure WebSocket (wss://) connections (Curl Advisory).

Mitigation and workarounds

The vulnerability has been fixed in curl version 8.16.0. Users are recommended to either upgrade to curl 8.16.0 or later, apply the patch to their local version, or avoid using ws:// protocols. The fix was implemented through a commit that ensures proper mask pattern updates for each frame (Curl Advisory).

Additional resources


SourceThis report was generated using AI

Related cURL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9086HIGH7.5
  • cURLcURL
  • libcurl-minimal-debuginfo
NoYesSep 12, 2025
CVE-2025-5399HIGH7.5
  • MySQLMySQL
  • mysql8.4-common
NoYesJun 07, 2025
CVE-2025-4947MEDIUM6.5
  • cURLcURL
  • libcurl
NoYesMay 28, 2025
CVE-2025-10148MEDIUM5.3
  • cURLcURL
  • libcurl-minimal
NoYesSep 12, 2025
CVE-2025-5025MEDIUM4.8
  • cURLcURL
  • snphost
NoYesMay 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management