CVE-2026-25679

NameCVE-2026-25679
Descriptionurl.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-1.15 (PTS)bullseye1.15.15-1~deb11u4fixed
golang-1.19 (PTS)bookworm1.19.8-2fixed
golang-1.24 (PTS)trixie1.24.4-1fixed
forky, sid1.24.13-2fixed
golang-1.25 (PTS)forky, sid1.25.8-1fixed
golang-1.26 (PTS)forky, sid1.26.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-1.15source(unstable)(not affected)
golang-1.19source(unstable)(not affected)
golang-1.24source(unstable)(not affected)
golang-1.25source(unstable)1.25.8-1
golang-1.26source(unstable)1.26.1-1

Notes

- golang-1.24 <not-affected> (Vulnerable code introduced later)
- golang-1.19 <not-affected> (Vulnerable code introduced later)
- golang-1.15 <not-affected> (Vulnerable code introduced later)
https://github.com/golang/go/issues/77578
Introduced with: https://github.com/golang/go/commit/f6f4e8b3ef21299db1ea3a343c3e55e91365a7fd (go1.26rc1)
Introduced with: https://github.com/golang/go/commit/9fd3ac8a10272afd90312fef5d379de7d688a58e (go1.25.2)
Introduced with: https://github.com/golang/go/commit/d6d2f7bf76718f1db05461cd912ae5e30d7b77ea (go1.24.8)
Fixed by: https://github.com/golang/go/commit/65c7d7a9fb3a9d1fbf1e702a211b8cc3a7bedb53 (go1.26.1)
Fixed by: https://github.com/golang/go/commit/d8174a9500d53784594b198f6195d1fae8dfe803 (go1.25.8)
Fix for CVE-2026-25679 depends on the fix for CVE-2025-47912

Search for package or bug name: Reporting problems