-
Notifications
You must be signed in to change notification settings - Fork 3
Description
CVE-2025-22872 - Medium Severity Vulnerability
Vulnerable Library - github.com/golang/net-v0.1.0
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.1.0.zip
Path to dependency file: /go.mod
Path to vulnerable library: /go.mod
Dependency Hierarchy:
- github.com/kubernetes/apimachinery-v0.22.0 (Root Library)
- ❌ github.com/golang/net-v0.1.0 (Vulnerable Library)
Found in HEAD commit: df1f7d3f67826e841793324e4796be4fbd91c00f
Found in base branch: main
Vulnerability Details
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Publish Date: 2025-04-16
URL: CVE-2025-22872
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Release Date: 2025-04-16
Fix Resolution: https://github.com/golang/net.git - v0.38.0
Step up your Open Source Security Game with Mend here