Client Certificate Authentication Flaw in wolfssl Python Package
CVE-2025-15346
What is CVE-2025-15346?
A flaw in the wolfssl Python package's handling of the certificate verification mode allows for insufficient enforcement of client certificate requirements. Specifically, when the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag is absent, the system incorrectly treats client certificates as optional. This misconfiguration means that while a peer certificate is verified when present, connections can be established without a client certificate, effectively bypassing mutual TLS (mTLS) authentication during the TLS handshake. This vulnerability impacts all versions prior to 5.8.4.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
wolfSSL-py Linux 5.3.0 <= 5.8.2
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
