HTTP Response Splitting Affecting std/net/http package, versions <1.19.11>=1.20.0-0 <1.20.6


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.26% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-STDNETHTTP-14548601
  • published6 Jan 2026
  • disclosed11 Jul 2023
  • creditBartek Nowotarski

Introduced: 11 Jul 2023

CVE-2023-29406  (opens in a new tab)
CWE-113  (opens in a new tab)

How to fix?

Upgrade std/net/http to version 1.19.11, 1.20.6 or higher.

Overview

std/net/http is a Go standard library package std/net/http

Affected versions of this package are vulnerable to HTTP Response Splitting.

Go Vulnerability Report:
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests.With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.

CVSS Base Scores

version 4.0
version 3.1