Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47911: CWE-400: Uncontrolled Resource Consumption in golang.org/x/net golang.org/x/net/html

0
High
VulnerabilityCVE-2025-47911cvecve-2025-47911cwe-400
Published: Thu Feb 05 2026 (02/05/2026, 17:48:44 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/net
Product: golang.org/x/net/html

Description

CVE-2025-47911 is a vulnerability in the golang. org/x/net/html package where the html. Parse function exhibits quadratic parsing complexity on certain crafted inputs. This behavior can be exploited by attackers to cause uncontrolled resource consumption, leading to denial of service (DoS). The vulnerability arises from inefficient parsing logic that causes excessive CPU and memory usage when processing maliciously crafted HTML content. No known exploits are currently reported in the wild. The vulnerability affects all versions of the package prior to a fix, and no official patch links are available yet. European organizations using Go-based web services or applications that parse untrusted HTML content with this library are at risk. Mitigation requires careful input validation, limiting resource allocation, or updating the package once a fix is released. Countries with significant software development sectors or critical infrastructure relying on Go are more likely to be impacted.

AI-Powered Analysis

AILast updated: 02/05/2026, 18:15:36 UTC

Technical Analysis

CVE-2025-47911 identifies a denial of service vulnerability in the golang.org/x/net/html package, specifically in the html.Parse function. The root cause is the quadratic time complexity of the parsing algorithm when handling certain crafted HTML inputs. This means that the time and resources required to parse input grow disproportionately with input size, allowing attackers to craft inputs that cause excessive CPU and memory consumption. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that it can exhaust system resources and degrade or halt service availability. The vulnerability affects all versions of the package prior to the fix, with no patch currently published. Exploitation does not require authentication or user interaction, and no known exploits have been observed in the wild yet. The golang.org/x/net/html package is widely used in Go applications for HTML parsing, including web servers, crawlers, and other networked services. An attacker can exploit this vulnerability by submitting specially crafted HTML content to a vulnerable service, causing it to consume excessive resources and potentially crash or become unresponsive. This can lead to denial of service conditions, impacting service availability and reliability. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, this vulnerability poses a significant risk to any service or application that uses the golang.org/x/net/html package to parse HTML content, especially if that content is user-supplied or otherwise untrusted. The uncontrolled resource consumption can lead to denial of service, causing service outages or degraded performance. This can affect web services, APIs, and backend systems, potentially disrupting business operations and customer-facing services. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that rely on Go-based applications may face operational risks and reputational damage. Additionally, the increased resource usage could lead to higher operational costs due to scaling or recovery efforts. Since exploitation does not require authentication or user interaction, the attack surface is broad, increasing the likelihood of opportunistic attacks. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor and audit usage of the golang.org/x/net/html package in internal and third-party applications to identify vulnerable versions. 2) Apply strict input validation and sanitization to limit the size and complexity of HTML content accepted from untrusted sources. 3) Implement resource usage limits such as CPU timeouts, memory caps, and request rate limiting on services that parse HTML to prevent resource exhaustion. 4) Use sandboxing or containerization to isolate parsing processes, minimizing impact on critical systems. 5) Stay informed about official patches or updates from the Go project and plan timely upgrades once fixes are released. 6) Consider alternative HTML parsing libraries with better performance characteristics if immediate patching is not feasible. 7) Conduct stress testing with crafted inputs to evaluate system resilience and tune defenses accordingly. 8) Employ Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block suspicious payloads targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-05-13T23:31:29.597Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6984daa9f9fa50a62f30a649

Added to database: 2/5/2026, 6:00:09 PM

Last enriched: 2/5/2026, 6:15:36 PM

Last updated: 2/5/2026, 9:28:53 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats