Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-33752
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Redirect-based SSRF leading to internal network access in curl_cffi (with TLS impersonation bypass)
Source: NVD (National Vulnerability Database)
Vulnerability Description
curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
curl_cffi 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
curl_cffi是lexiforest个人开发者的一个支持浏览器指纹模拟的Python HTTP客户端库。 curl_cffi 0.15.0之前版本存在代码问题漏洞,该漏洞源于未限制对内部IP范围的请求且自动跟随重定向,可能导致请求被重定向至内部服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
lexiforestcurl_cffi < 0.15.0 -
II. Public POCs for CVE-2026-33752
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-33752
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-33752

No comments yet


Leave a comment