Client Certificate Authentication Flaw in wolfssl Python Package
CVE-2025-15346

9.3CRITICAL

Key Information:

Vendor

Wolfssl

Vendor
CVE Published:
7 January 2026

What is CVE-2025-15346?

A flaw in the wolfssl Python package's handling of the certificate verification mode allows for insufficient enforcement of client certificate requirements. Specifically, when the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag is absent, the system incorrectly treats client certificates as optional. This misconfiguration means that while a peer certificate is verified when present, connections can be established without a client certificate, effectively bypassing mutual TLS (mTLS) authentication during the TLS handshake. This vulnerability impacts all versions prior to 5.8.4.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wolfSSL-py Linux 5.3.0 <= 5.8.2

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Matan Radomski
.