Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qw2m-4pqf-rmpp | curl_cffi: Redirect-based SSRF leads to internal network access in curl_cffi (with TLS impersonation bypass) |
Thu, 09 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:lexiforest:curl_cffi:*:*:*:*:*:python:*:* cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta1:*:*:*:python:*:* cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta2:*:*:*:python:*:* cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta3:*:*:*:python:*:* cpe:2.3:a:lexiforest:curl_cffi:0.15.0:beta4:*:*:*:python:*:* |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lexiforest
Lexiforest curl Cffi |
|
| Vendors & Products |
Lexiforest
Lexiforest curl Cffi |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0. | |
| Title | Redirect-based SSRF leading to internal network access in curl_cffi (with TLS impersonation bypass) | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:40:54.380Z
Reserved: 2026-03-23T18:30:14.125Z
Link: CVE-2026-33752
Updated: 2026-04-06T15:34:37.548Z
Status : Analyzed
Published: 2026-04-06T16:16:34.140
Modified: 2026-04-09T18:10:21.143
Link: CVE-2026-33752
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:15Z
Github GHSA