CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2025-47912 – Insufficient validation of bracketed IPv6 hostnames in net/url
https://notcve.org/view.php?id=CVE-2025-47912
09 Oct 2025 — The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement. • https://go.dev/cl/709857 •
CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0CVE-2025-58186 – Lack of limit when parsing cookies can cause memory exhaustion in net/http
https://notcve.org/view.php?id=CVE-2025-58186
09 Oct 2025 — Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption. These are all security issues fixed in the regclient-0.10.0-1.1 package on the GA media of openSUSE Tumbleweed. • https://go.dev/cl/709855 •
CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0CVE-2025-61724 – Excessive CPU consumption in Reader.ReadResponse in net/textproto
https://notcve.org/view.php?id=CVE-2025-61724
09 Oct 2025 — The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption. These are all security issues fixed in the go1.25-1.25.2-1.1 package on the GA media of openSUSE Tumbleweed. • https://go.dev/cl/709859 •
CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0CVE-2025-61725 – Excessive CPU consumption in ParseAddress in net/mail
https://notcve.org/view.php?id=CVE-2025-61725
09 Oct 2025 — The ParseAddress function constructeds domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption. These are all security issues fixed in the go1.25-1.25.2-1.1 package on the GA media of openSUSE Tumbleweed. • https://go.dev/cl/709860 •
CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0CVE-2025-47910 – CrossOriginProtection insecure bypass patterns not limited to exact matches in net/http
https://notcve.org/view.php?id=CVE-2025-47910
06 Sep 2025 — When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections. These are all security issues fixed in the go1.25-1.25.1-1.1 package on the GA media of openSUSE Tumbleweed. • https://go.dev/cl/699275 •
CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0CVE-2025-4673 – Sensitive headers not cleared on cross-origin redirect in net/http
https://notcve.org/view.php?id=CVE-2025-4673
09 Jun 2025 — Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information. A flaw was found in net/http. Handling Proxy-Authorization and Proxy-Authenticate headers during cross-origin redirects allows these headers to be inadvertently forwarded, potentially exposing sensitive authentication credentials. This flaw allows a network-based attacker to manipulate redirect responses, unintentionally exposing authentication details to unauthorized parties. Ky... • https://go.dev/cl/679257 •
CVSS: 9.4EPSS: 0%CPEs: 2EXPL: 0CVE-2025-22871 – Request smuggling due to acceptance of invalid chunked data in net/http
https://notcve.org/view.php?id=CVE-2025-22871
04 Apr 2025 — The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext. A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smugglin... • https://go.dev/cl/652998 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •
CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 0CVE-2024-45336 – Sensitive headers incorrectly sent after cross-domain redirect in net/http
https://notcve.org/view.php?id=CVE-2024-45336
28 Jan 2025 — The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2. A flaw was found in the net/http... • https://go.dev/cl/643100 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0CVE-2024-24791 – Denial of service due to improper 100-continue handling in net/http
https://notcve.org/view.php?id=CVE-2024-24791
02 Jul 2024 — The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational respon... • https://go.dev/cl/591255 • CWE-20: Improper Input Validation •
CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0CVE-2024-24788 – Malformed DNS message can cause infinite loop in net
https://notcve.org/view.php?id=CVE-2024-24788
08 May 2024 — A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. Un mensaje DNS con formato incorrecto en respuesta a una consulta puede hacer que las funciones de búsqueda se atasquen en un bucle infinito. A flaw was found in the net package of the Go stdlib. When a malformed DNS message is received as a response to a query, the Lookup functions within the net package can get stuck in an infinite loop. This issue can lead to resource exhaustion and denial of s... • http://www.openwall.com/lists/oss-security/2024/05/08/3 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
