Server-side Request Forgery (SSRF) Affecting std/net/url package, versions <1.25.8>=1.26.0-0 <1.26.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-STDNETURL-15440727
  • published9 Mar 2026
  • disclosed6 Mar 2026
  • creditMasaki Hara

Introduced: 6 Mar 2026

NewCVE-2026-25679  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade std/net/url to version 1.25.8, 1.26.1 or higher.

Overview

std/net/url is a Go standard library package std/net/url

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to insufficient validation of the url.Parse process. An attacker can bypass expected URL parsing restrictions by supplying specially crafted URLs containing invalid host or authority components.

CVSS Base Scores

version 4.0
version 3.1