When curl is told to use the Certificate Status Request TLS extension, often
referred to as *OCSP stapling*, to verify that the server certificate is
valid, it fails to detect OCSP problems and instead wrongly consider the
response as fine.

Project Subscriptions

Vendors Products
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Curl
Curl curl
Weaknesses CWE-200
CWE-284
Vendors & Products Curl
Curl curl

Wed, 13 May 2026 09:15:00 +0000

Type Values Removed Values Added
Description When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.
Title OCSP stapling bypass with Apple SecTrust
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2026-05-13T09:05:48.665Z

Reserved: 2026-04-25T08:37:24.989Z

Link: CVE-2026-7009

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:30:16Z

Weaknesses