An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
References
Link | Resource |
---|---|
https://go.dev/cl/652155 | Patch |
https://go.dev/issue/71490 | Issue Tracking Patch |
https://pkg.go.dev/vuln/GO-2025-3488 | Third Party Advisory |
Configurations
History
01 May 2025, 19:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://go.dev/cl/652155 - Patch | |
References | () https://go.dev/issue/71490 - Issue Tracking, Patch | |
References | () https://pkg.go.dev/vuln/GO-2025-3488 - Third Party Advisory | |
Summary |
|
|
First Time |
Go
Go jws |
|
CPE | cpe:2.3:a:go:jws:*:*:*:*:*:go:*:* |
26 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 08:14
Updated : 2025-05-01 19:27
NVD link : CVE-2025-22868
Mitre link : CVE-2025-22868
CVE.ORG link : CVE-2025-22868
JSON object : View
Products Affected
go
- jws
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input