6.5 CVE-2026-3784
Enriched by CISA Patch Exploit
curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a
server, even if the new request uses different credentials for the HTTP proxy.
The proper behavior is to create or use a separate connection.
https://nvd.nist.gov/vuln/detail/CVE-2026-3784
Categories
CWE-305 : Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. The provided password is only compared against the first character of the real password. The password is not properly checked, which allows remote attackers to bypass access controls by sending a 1-byte password that matches the first character of the real password. Chain: Forum software does not properly initialize an array, which inadvertently sets the password to a single character, allowing remote attackers to easily guess the password and gain administrative privileges.
References
2499f714-1537-4658-8207-48ae4bb9eae9 Patch Exploit
| https://curl.se/docs/CVE-2026-3784.html Patch Vendor Advisory |
| https://curl.se/docs/CVE-2026-3784.json Vendor Advisory |
| https://hackerone.com/reports/3584903 Exploit Issue Tracking Third Party Advisory |
af854a3a-2127-422b-91ae-364da2661108 Patch Exploit
| http://www.openwall.com/lists/oss-security/2026/03/11/3 Mailing List Third Party Advisory |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| curl | curl |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | >= 7.7 | < 8.18.0 |
REMEDIATION
Patch
| Url |
|---|
| https://curl.se/docs/CVE-2026-3784.html |
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| https://hackerone.com/reports/3584903 |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
