Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22873: CWE-23: Relative Path Traversal in Go standard library os

0
Medium
VulnerabilityCVE-2025-22873cvecve-2025-22873cwe-23
Published: Wed Feb 04 2026 (02/04/2026, 23:05:24 UTC)
Source: CVE Database V5
Vendor/Project: Go standard library
Product: os

Description

CVE-2025-22873 is a relative path traversal vulnerability in the Go standard library's os package that allows opening the parent directory of a specified root directory by using a filename ending with ".. /". This vulnerability permits access to the immediate parent directory but does not allow traversal beyond that or access to files within the parent directory. It affects Go versions up to 1. 24. 0-0 and has no known exploits in the wild. Although no CVSS score is assigned, the vulnerability can potentially expose directory structures and sensitive metadata, impacting confidentiality and integrity. Exploitation requires the ability to invoke the vulnerable os. Root. Open function with crafted input, typically in applications that use Go's os package for file system access.

AI-Powered Analysis

AILast updated: 02/04/2026, 23:29:41 UTC

Technical Analysis

CVE-2025-22873 is a relative path traversal vulnerability identified in the Go standard library's os package, specifically affecting the os.Root.Open function. The flaw allows an attacker to open the parent directory of a defined root directory by providing a filename that ends with "../". This bypasses intended directory restrictions by permitting access to the immediate parent directory, although it does not allow traversal beyond that or access to files within the parent directory. The vulnerability arises because the path sanitization logic in the os package does not correctly handle trailing "../" sequences, enabling this limited directory escape. The affected versions include all Go releases up to 1.24.0-0. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability could be exploited in scenarios where Go applications use os.Root.Open to restrict file system access, such as sandboxed environments or containerized applications. Attackers with the ability to influence file paths passed to this function could leverage this flaw to gain unintended directory visibility, potentially exposing sensitive directory metadata or configuration files located in the parent directory. However, since the traversal is limited to the immediate parent directory and does not allow file reads within it, the impact is somewhat constrained. The vulnerability highlights the importance of rigorous path validation and sandboxing in file system operations within Go applications.

Potential Impact

For European organizations, the impact of CVE-2025-22873 depends largely on the extent to which Go-based applications are used to enforce file system boundaries or sandboxing. Organizations that deploy Go applications in cloud-native environments, microservices, or containerized platforms may be at risk if these applications rely on os.Root.Open for directory access restrictions. The vulnerability could lead to unauthorized disclosure of directory contents or metadata in the parent directory, potentially exposing sensitive configuration or operational data. While the traversal does not allow access to files within the parent directory, knowledge of directory structure or metadata can aid attackers in further reconnaissance or targeted attacks. This could impact confidentiality and integrity of systems, especially in regulated industries such as finance, healthcare, or critical infrastructure sectors prevalent in Europe. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks once weaponized. Additionally, organizations relying on Go for internal tooling or customer-facing applications should assess exposure to this flaw to prevent privilege escalation or sandbox escape scenarios.

Mitigation Recommendations

1. Upgrade to a fixed version of the Go standard library once a patch is released beyond version 1.24.0-0 to ensure the vulnerability is addressed at the source. 2. Implement strict input validation and sanitization on all file path inputs, explicitly disallowing trailing "../" sequences or other path traversal patterns before passing them to os.Root.Open or similar functions. 3. Employ additional sandboxing or containerization layers that enforce file system access controls independently of application logic, limiting the impact of any directory traversal. 4. Conduct code reviews and static analysis focused on file system access patterns in Go applications to identify and remediate unsafe usage of os.Root.Open or related APIs. 5. Monitor application logs for unusual file access patterns or attempts to use directory traversal sequences in file paths. 6. Educate developers about secure file handling practices in Go, emphasizing the risks of path traversal and the importance of defense-in-depth. 7. For critical environments, consider runtime application self-protection (RASP) or host-based intrusion detection systems to detect and block suspicious file system operations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-01-08T19:11:42.835Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6983d2fdf9fa50a62fb3480c

Added to database: 2/4/2026, 11:15:09 PM

Last enriched: 2/4/2026, 11:29:41 PM

Last updated: 2/5/2026, 1:46:15 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats