File tree Expand file tree Collapse file tree 1 file changed +65
-0
lines changed
advisories/github-reviewed/2025/07/GHSA-6v2p-p543-phr9 Expand file tree Collapse file tree 1 file changed +65
-0
lines changed Original file line number Diff line number Diff line change
1
+ {
2
+ "schema_version" : " 1.4.0" ,
3
+ "id" : " GHSA-6v2p-p543-phr9" ,
4
+ "modified" : " 2025-07-18T17:27:22Z" ,
5
+ "published" : " 2025-07-18T17:27:22Z" ,
6
+ "aliases" : [
7
+ " CVE-2025-22868"
8
+ ],
9
+ "summary" : " golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability" ,
10
+ "details" : " An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing." ,
11
+ "severity" : [
12
+ {
13
+ "type" : " CVSS_V3" ,
14
+ "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15
+ }
16
+ ],
17
+ "affected" : [
18
+ {
19
+ "package" : {
20
+ "ecosystem" : " Go" ,
21
+ "name" : " golang.org/x/oauth2"
22
+ },
23
+ "ranges" : [
24
+ {
25
+ "type" : " ECOSYSTEM" ,
26
+ "events" : [
27
+ {
28
+ "introduced" : " 0"
29
+ },
30
+ {
31
+ "fixed" : " 0.27.0"
32
+ }
33
+ ]
34
+ }
35
+ ]
36
+ }
37
+ ],
38
+ "references" : [
39
+ {
40
+ "type" : " ADVISORY" ,
41
+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
42
+ },
43
+ {
44
+ "type" : " WEB" ,
45
+ "url" : " https://go.dev/cl/652155"
46
+ },
47
+ {
48
+ "type" : " WEB" ,
49
+ "url" : " https://go.dev/issue/71490"
50
+ },
51
+ {
52
+ "type" : " WEB" ,
53
+ "url" : " https://pkg.go.dev/vuln/GO-2025-3488"
54
+ }
55
+ ],
56
+ "database_specific" : {
57
+ "cwe_ids" : [
58
+ " CWE-1286"
59
+ ],
60
+ "severity" : " HIGH" ,
61
+ "github_reviewed" : true ,
62
+ "github_reviewed_at" : " 2025-07-18T17:27:22Z" ,
63
+ "nvd_published_at" : " 2025-02-26T08:14:24Z"
64
+ }
65
+ }
You can’t perform that action at this time.
0 commit comments