Injection Affecting std/net package, versions <1.15.13>=1.16.0-0 <1.16.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-STDNET-14550534
  • published6 Jan 2026
  • disclosed17 Feb 2022
  • creditPhilipp Jeitner, Haya Shulman from Fraunhofer SIT

Introduced: 17 Feb 2022

CVE-2021-33195  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade std/net to version 1.15.13, 1.16.5 or higher.

Overview

std/net is a Go standard library package std/net

Affected versions of this package are vulnerable to Injection.

Go Vulnerability Report:
The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions and their respective methods on the Resolver type may return arbitrary values retrieved from DNS which do not follow the established RFC 1035 rules for domain names. If these names are used without further sanitization, for instance unsafely included in HTML, they may allow for injection of unexpected content. Note that LookupTXT may still return arbitrary values that could require sanitization before further use.

CVSS Base Scores

version 4.0
version 3.1