When curl is told to use the Certificate Status Request TLS extension, often
referred to as *OCSP stapling*, to verify that the server certificate is
valid, it fails to detect OCSP problems and instead wrongly consider the
response as fine.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Curl
Curl curl |
|
| Weaknesses | CWE-200 CWE-284 |
|
| Vendors & Products |
Curl
Curl curl |
Wed, 13 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine. | |
| Title | OCSP stapling bypass with Apple SecTrust | |
| References |
|
Status: PUBLISHED
Assigner: curl
Published:
Updated: 2026-05-13T09:05:48.665Z
Reserved: 2026-04-25T08:37:24.989Z
Link: CVE-2026-7009
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:30:16Z