Go

12 CVEs product

Monthly

CVE-2025-68121 CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass Go Redhat +1
NVD VulDB
CVSS 3.1
10.0
EPSS
0.0%
CVE-2025-61732 HIGH PATCH This Week

A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary. [CVSS 8.6 HIGH]

Golang Go Redhat Suse
NVD VulDB
CVSS 3.1
8.6
EPSS
0.0%
CVE-2025-68119 HIGH PATCH This Week

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. [CVSS 7.0 HIGH]

Buffer Overflow RCE Go Redhat Suse
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2025-61731 HIGH PATCH This Week

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. [CVSS 7.8 HIGH]

Golang Go Redhat Suse
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-61730 MEDIUM PATCH This Month

During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. [CVSS 5.3 MEDIUM]

Tls Information Disclosure Go Suse
NVD VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-61728 MEDIUM POC PATCH This Month

archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. [CVSS 6.5 MEDIUM]

Denial Of Service Go Redhat Suse
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-61726 HIGH PATCH This Week

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. [CVSS 7.5 HIGH]

Denial Of Service Go Redhat Suse
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-61727 MEDIUM PATCH This Month

An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.

Information Disclosure Ubuntu Debian Go Redhat +1
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-61729 HIGH PATCH This Week

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

Information Disclosure Ubuntu Debian Go Redhat +1
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-47906 MEDIUM POC PATCH This Month

If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath ("", ".", and ".."), can result in the binaries listed in the. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Go Redhat Suse
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-47907 HIGH PATCH This Month

Cancelling a query (e.g. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable, no authentication required.

Information Disclosure Race Condition Go Redhat Suse
NVD
CVSS 3.1
7.0
EPSS
0.0%
CVE-2025-0913 MEDIUM PATCH This Month

os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.

Microsoft Information Disclosure Ubuntu Debian Go +2
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-68121
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass +3
NVD VulDB
CVE-2025-61732
EPSS 0% CVSS 8.6
HIGH PATCH This Week

A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary. [CVSS 8.6 HIGH]

Golang Go Redhat +1
NVD VulDB
CVE-2025-68119
EPSS 0% CVSS 7.0
HIGH PATCH This Week

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. [CVSS 7.0 HIGH]

Buffer Overflow RCE Go +2
NVD VulDB
CVE-2025-61731
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. [CVSS 7.8 HIGH]

Golang Go Redhat +1
NVD VulDB
CVE-2025-61730
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. [CVSS 5.3 MEDIUM]

Tls Information Disclosure Go +1
NVD VulDB
CVE-2025-61728
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. [CVSS 6.5 MEDIUM]

Denial Of Service Go Redhat +1
NVD VulDB
CVE-2025-61726
EPSS 0% CVSS 7.5
HIGH PATCH This Week

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. [CVSS 7.5 HIGH]

Denial Of Service Go Redhat +1
NVD VulDB
CVE-2025-61727
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.

Information Disclosure Ubuntu Debian +3
NVD VulDB
CVE-2025-61729
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

Information Disclosure Ubuntu Debian +3
NVD VulDB
CVE-2025-47906
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath ("", ".", and ".."), can result in the binaries listed in the. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Go Redhat +1
NVD
CVE-2025-47907
EPSS 0% CVSS 7.0
HIGH PATCH This Month

Cancelling a query (e.g. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable, no authentication required.

Information Disclosure Race Condition Go +2
NVD
CVE-2025-0913
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.

Microsoft Information Disclosure Ubuntu +4
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy