{"api_version":"1","generated_at":"2026-04-17T00:29:08+00:00","cve":"CVE-2022-26491","urls":{"html":"https://cve.report/CVE-2022-26491","api":"https://cve.report/api/cve/CVE-2022-26491.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-26491","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-26491"},"summary":{"title":"CVE-2022-26491","description":"An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-06-02 14:15:00","updated_at":"2022-06-09 19:01:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc","name":"https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc","refsource":"MISC","tags":[],"title":"HGKeeper","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://developer.pidgin.im/wiki/FullChangeLog","name":"https://developer.pidgin.im/wiki/FullChangeLog","refsource":"MISC","tags":[],"title":"FullChangeLog – Pidgin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://pidgin.im/about/security/advisories/cve-2022-26491/","name":"https://pidgin.im/about/security/advisories/cve-2022-26491/","refsource":"MISC","tags":[],"title":"cve-2022-26491-00 :: Pidgin, the universal chat client","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/xsf/xeps/pull/1158","name":"https://github.com/xsf/xeps/pull/1158","refsource":"MISC","tags":[],"title":"Remove _xmppconnect DNS method from XEP-0156 and add warnings by moparisthebest · Pull Request #1158 · xsf/xeps · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00005.html","name":"[debian-lts-announce] 20220606 [SECURITY] [DLA 3043-1] pidgin security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3043-1] pidgin security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://mail.jabber.org/pipermail/standards/2022-February/038759.html","name":"https://mail.jabber.org/pipermail/standards/2022-February/038759.html","refsource":"MISC","tags":[],"title":"[Standards] XEP-0156 _xmppconnect is vulnerable to MITM","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-26491","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-26491","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"26491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"26491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pidgin","cpe5":"pidgin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-26491","qid":"179355","title":"Debian Security Update for pidgin (DLA 3043-1)"},{"cve":"CVE-2022-26491","qid":"182377","title":"Debian Security Update for pidgin (CVE-2022-26491)"},{"cve":"CVE-2022-26491","qid":"282735","title":"Fedora Security Update for pidgin (FEDORA-2022-52777fea3c)"},{"cve":"CVE-2022-26491","qid":"282736","title":"Fedora Security Update for pidgin (FEDORA-2022-4759ca6476)"},{"cve":"CVE-2022-26491","qid":"282737","title":"Fedora Security Update for pidgin (FEDORA-2022-4490dce823)"},{"cve":"CVE-2022-26491","qid":"355575","title":"Amazon Linux Security Advisory for pidgin : ALAS2-2023-2115"},{"cve":"CVE-2022-26491","qid":"502334","title":"Alpine Linux Security Update for pidgin"},{"cve":"CVE-2022-26491","qid":"672015","title":"EulerOS Security Update for pidgin (EulerOS-SA-2022-2230)"},{"cve":"CVE-2022-26491","qid":"672042","title":"EulerOS Security Update for pidgin (EulerOS-SA-2022-2277)"},{"cve":"CVE-2022-26491","qid":"752136","title":"SUSE Enterprise Linux Security Update for pidgin (SUSE-SU-2022:1664-1)"},{"cve":"CVE-2022-26491","qid":"753096","title":"SUSE Enterprise Linux Security Update for pidgin (SUSE-SU-2022:1693-1)"},{"cve":"CVE-2022-26491","qid":"753466","title":"SUSE Enterprise Linux Security Update for pidgin (SUSE-SU-2022:1665-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-26491","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://mail.jabber.org/pipermail/standards/2022-February/038759.html","refsource":"MISC","name":"https://mail.jabber.org/pipermail/standards/2022-February/038759.html"},{"url":"https://github.com/xsf/xeps/pull/1158","refsource":"MISC","name":"https://github.com/xsf/xeps/pull/1158"},{"url":"https://developer.pidgin.im/wiki/FullChangeLog","refsource":"MISC","name":"https://developer.pidgin.im/wiki/FullChangeLog"},{"refsource":"MISC","name":"https://pidgin.im/about/security/advisories/cve-2022-26491/","url":"https://pidgin.im/about/security/advisories/cve-2022-26491/"},{"refsource":"MISC","name":"https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc","url":"https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc"},{"refsource":"MLIST","name":"[debian-lts-announce] 20220606 [SECURITY] [DLA 3043-1] pidgin security update","url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00005.html"}]}},"nvd":{"publishedDate":"2022-06-02 14:15:00","lastModifiedDate":"2022-06-09 19:01:00","problem_types":["CWE-295"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*","versionEndExcluding":"2.14.9","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}