When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.
History

Wed, 13 May 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Curl
Curl curl
Weaknesses CWE-200
CWE-284
Vendors & Products Curl
Curl curl

Wed, 13 May 2026 09:15:00 +0000

Type Values Removed Values Added
Description When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.
Title OCSP stapling bypass with Apple SecTrust
References

cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2026-05-13T09:05:48.665Z

Reserved: 2026-04-25T08:37:24.989Z

Link: CVE-2026-7009

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:30:16Z