Skip to content

Fix CVE-2025-61726: Upgrade Go to 1.23.6#12

Open
chainloop-development[bot] wants to merge 1 commit intomainfrom
chainloop/fix-cve-2025-61726-20260422-011727
Open

Fix CVE-2025-61726: Upgrade Go to 1.23.6#12
chainloop-development[bot] wants to merge 1 commit intomainfrom
chainloop/fix-cve-2025-61726-20260422-011727

Conversation

@chainloop-development
Copy link
Copy Markdown

Summary

Upgraded Go version from 1.21 to 1.23.6 to address CVE-2025-61726, a HIGH severity vulnerability that allows attackers to cause denial of service through excessive memory consumption during form parsing.

Vulnerability Fixed

CVE-2025-61726 (HIGH): The net/url package does not set a limit on the number of query parameters in a query, allowing attackers to craft requests with thousands of unique parameters that consume excessive memory during form parsing operations.

Changes Made

  • Updated go.mod to require Go 1.23.6, which includes the fix for CVE-2025-61726
  • This change addresses the vulnerability in simple-todo.go where r.FormValue("name") is called in the insert handler (line 78) and updateByID handler (line 94), both of which internally invoke the vulnerable ParseForm() method
  • The upgrade prevents potential DoS attacks via maliciously crafted POST/PUT requests with excessive URL-encoded parameters

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants