-
Notifications
You must be signed in to change notification settings - Fork 81
Description
CVE-2025-22872 - Medium Severity Vulnerability
Vulnerable Library - github.com/golang/net-v0.1.0
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/github.com/golang/net/@v/v0.1.0.zip
Path to dependency file: /go.mod
Path to vulnerable library: /go.mod
Dependency Hierarchy:
- github.com/aftership/email-verifier-v1.3.0 (Root Library)
- ❌ github.com/golang/net-v0.1.0 (Vulnerable Library)
Found in HEAD commit: 296953fdf7b1766daf9ff2839a0e0a7b0d3f371e
Found in base branch: dev
Vulnerability Details
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Publish Date: 2025-04-16
URL: CVE-2025-22872
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Release Date: 2025-04-16
Fix Resolution: https://github.com/golang/net.git - v0.38.0,github.com/golang/net - v0.38.0
Step up your Open Source Security Game with Mend here