Insertion of Sensitive Information Into Sent Data Affecting std/net/http package, versions <1.17.12>=1.18.0-0 <1.18.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-STDNETHTTP-14548605
  • published6 Jan 2026
  • disclosed28 Jul 2022
  • creditChristian Mehlmauer

Introduced: 28 Jul 2022

CVE-2022-32148  (opens in a new tab)
CWE-201  (opens in a new tab)

How to fix?

Upgrade std/net/http to version 1.17.12, 1.18.4 or higher.

Overview

std/net/http is a Go standard library package std/net/http

Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data.

Go Vulnerability Report:
Client IP adresses may be unintentionally exposed via X-Forwarded-For headers.When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy sets the client IP as the value of the X-Forwarded-For header, contrary to its documentation.In the more usual case where a Director function sets the X-Forwarded-For header value to nil, ReverseProxy leaves the header unmodified as expected.

CVSS Base Scores

version 4.0
version 3.1