Ghostwire

CVE-2026-7009: When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify...

CRITICAL CVSS 9.5 EPSS 0.01%

Published: May 13, 2026 | Last Modified: May 13, 2026

Description

When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.01% (1th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (2 articles)

References