
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-0725 is a vulnerability in libcurl that affects versions 7.10.5 through 8.11.1, discovered on January 23, 2025, and publicly disclosed on February 5, 2025. The vulnerability occurs when libcurl performs automatic gzip decompression of content-encoded HTTP responses using the CURLOPTACCEPTENCODING option specifically with zlib versions 1.2.0.3 or older (Curl Advisory).
The vulnerability is classified as CWE-680: Integer Overflow to Buffer Overflow with a Low severity rating. The issue manifests when libcurl takes a different code path for older zlib versions due to lack of functionality, leading to an attacker-controlled integer overflow that results in a buffer overflow. The vulnerability specifically affects the curl command line tool and applications using libcurl with the CURLOPTACCEPTENCODING option (Curl Advisory, OSS Security).
While the potential impact of this vulnerability is significant as it could lead to buffer overflow, the actual risk is considered low because it only affects systems using zlib versions older than 1.2.0.4, which was released in August 2003. Systems vulnerable to this issue are likely already exposed to numerous other security problems due to using such outdated software (Curl Advisory).
Several mitigation options are available, recommended in order of preference: 1) Upgrade curl and libcurl to version 8.12.0 or later, 2) Apply the patch to the existing version and rebuild, 3) Use a modern zlib version, or 4) Avoid using the CURLOPTACCEPTENCODING option. Starting with version 8.12.0, libcurl no longer supports zlib versions older than 1.2.0.4, instead throwing a runtime error (Curl Advisory).
The security community has engaged in technical discussions about the implementation of the fix, particularly regarding the version comparison method used in the patch. A subsequent fix was proposed to address potential issues with version string comparisons, as highlighted in the community feedback (OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”