Exposure of Sensitive System Information to an Unauthorized Control Sphere Affecting std/net/url package, versions <1.24.8>=1.25.0 <1.25.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-STDNETURL-14546349
  • published6 Jan 2026
  • disclosed29 Oct 2025
  • creditEnze Wang, Jingcheng Yang, Zehui Miao

Introduced: 29 Oct 2025

CVE-2025-47912  (opens in a new tab)
CWE-497  (opens in a new tab)

How to fix?

Upgrade std/net/url to version 1.24.8, 1.25.2 or higher.

Overview

std/net/url is a Go standard library package std/net/url

Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere.

Go Vulnerability Report:
The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.

CVSS Base Scores

version 4.0
version 3.1