CVE-2025-61726

EUVD-2025-206445
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
Affected Products (NVD)
VendorProductVersion
golanggo
𝑥
< 1.24.12
golanggo
1.25.0 ≤
𝑥
< 1.25.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
golang-1.15
bookworm
no-dsa
bullseye
vulnerable
trixie
no-dsa
golang-1.19
bookworm
vulnerable
bullseye
postponed
trixie
no-dsa
golang-1.24
bookworm
no-dsa
bullseye
postponed
forky
1.24.13-2
fixed
sid
1.24.13-2
fixed
trixie
no-dsa
golang-1.25
bookworm
no-dsa
bullseye
postponed
forky
1.25.7-2
fixed
sid
1.25.7-2
fixed
trixie
no-dsa