| Name | CVE-2026-25679 |
| Description | url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
The information below is based on the following data on fixed versions.
Notes
- golang-1.24 <not-affected> (Vulnerable code introduced later)
- golang-1.19 <not-affected> (Vulnerable code introduced later)
- golang-1.15 <not-affected> (Vulnerable code introduced later)
https://github.com/golang/go/issues/77578
Introduced with: https://github.com/golang/go/commit/f6f4e8b3ef21299db1ea3a343c3e55e91365a7fd (go1.26rc1)
Introduced with: https://github.com/golang/go/commit/9fd3ac8a10272afd90312fef5d379de7d688a58e (go1.25.2)
Introduced with: https://github.com/golang/go/commit/d6d2f7bf76718f1db05461cd912ae5e30d7b77ea (go1.24.8)
Fixed by: https://github.com/golang/go/commit/65c7d7a9fb3a9d1fbf1e702a211b8cc3a7bedb53 (go1.26.1)
Fixed by: https://github.com/golang/go/commit/d8174a9500d53784594b198f6195d1fae8dfe803 (go1.25.8)
Fix for CVE-2026-25679 depends on the fix for CVE-2025-47912