Go Vulnerability Database
Data about new vulnerabilities come directly from Go package maintainers or sources such as MITRE and GitHub. Reports are curated by the Go Security team. Learn more at go.dev/security/vuln.
Search
Recent Reports
GO-2025-4116
- CVE-2025-47913
- Affects: golang.org/x/crypto
- Published: Nov 13, 2025
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
GO-2025-4088
- CVE-2025-61141, GHSA-f9f4-5859-29mf
- Affects: github.com/sqls-server/sqls
- Published: Nov 05, 2025
sqls-server/sqls is vulnerable to command injection in the config command in github.com/sqls-server/sqls
GO-2025-4087
- GHSA-fj2x-735w-74vq
- Affects: github.com/consensys/gnark-crypto
- Published: Nov 05, 2025
Unchecked memory allocation during vector deserialization in github.com/consensys/gnark-crypto
GO-2025-4086
- GHSA-cf57-c578-7jvv
- Affects: github.com/TecharoHQ/anubis
- Published: Nov 05, 2025
Anubis vulnerable to possible XSS via redir parameter when using subrequest auth mode in github.com/TecharoHQ/anubis
GO-2025-4085
- CVE-2025-64102, GHSA-xrw9-r35x-x878
- Affects: github.com/zitadel/zitadel
- Published: Nov 05, 2025
Zitadel allows brute-forcing authentication factors in github.com/zitadel/zitadel. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/zitadel/zitadel before v2.71.18.
If you don't see an existing, public Go vulnerability in a publicly importable package in our database, please let us know.