CVE-2025-22868

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
References
Link Resource
https://go.dev/cl/652155 Patch
https://go.dev/issue/71490 Issue Tracking Patch
https://pkg.go.dev/vuln/GO-2025-3488 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:go:jws:*:*:*:*:*:go:*:*

History

01 May 2025, 19:27

Type Values Removed Values Added
References () https://go.dev/cl/652155 - () https://go.dev/cl/652155 - Patch
References () https://go.dev/issue/71490 - () https://go.dev/issue/71490 - Issue Tracking, Patch
References () https://pkg.go.dev/vuln/GO-2025-3488 - () https://pkg.go.dev/vuln/GO-2025-3488 - Third Party Advisory
Summary
  • (es) Un atacante puede pasar un token malintencionado que provoque un consumo inesperado de memoria durante el análisis.
First Time Go
Go jws
CPE cpe:2.3:a:go:jws:*:*:*:*:*:go:*:*

26 Feb 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 08:14

Updated : 2025-05-01 19:27


NVD link : CVE-2025-22868

Mitre link : CVE-2025-22868

CVE.ORG link : CVE-2025-22868


JSON object : View

Products Affected

go

  • jws
CWE
CWE-1286

Improper Validation of Syntactic Correctness of Input