Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58189: CWE-117: Improper Output Neutralization for Logs in Go standard library crypto/tls

0
Medium
VulnerabilityCVE-2025-58189cvecve-2025-58189cwe-117
Published: Wed Oct 29 2025 (10/29/2025, 22:10:12 UTC)
Source: CVE Database V5
Vendor/Project: Go standard library
Product: crypto/tls

Description

When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.

AI-Powered Analysis

AILast updated: 11/05/2025, 23:23:33 UTC

Technical Analysis

CVE-2025-58189 is a vulnerability identified in the Go programming language's standard library, specifically within the crypto/tls package used for implementing TLS protocols. The issue arises during the ALPN (Application-Layer Protocol Negotiation) handshake phase, where if the handshake fails, the error message includes the ALPN protocols sent by the client. These protocols are attacker-controlled inputs that are logged without proper escaping or neutralization, leading to CWE-117: Improper Output Neutralization for Logs. This flaw allows an attacker to inject malicious content into log files, potentially enabling log forging or injection attacks. Such attacks can confuse log analysis, hide malicious activity, or trigger false alarms. The vulnerability affects all versions up to and including Go 1.25.0. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the vulnerability is remotely exploitable without authentication or user interaction but only impacts confidentiality slightly and does not affect integrity or availability. No public exploits have been reported yet. The root cause is insufficient sanitization of attacker-controlled data before logging, a common issue in software that handles external inputs. Since crypto/tls is widely used in Go applications for secure communications, this vulnerability has a broad potential impact wherever Go is used for TLS connections.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential compromise of log integrity. Attackers could inject misleading or malicious entries into logs, which may hinder incident response, forensic investigations, and security monitoring. This could delay detection of actual attacks or cause misattribution of events. While the vulnerability does not allow direct compromise of data confidentiality, integrity, or availability of systems, the indirect effects on security operations could be significant, especially in highly regulated sectors like finance, healthcare, and critical infrastructure. Organizations relying on Go-based services for TLS communications, including web servers, APIs, and microservices, are at risk. The vulnerability could be exploited remotely without credentials, increasing the attack surface. However, since no known exploits exist yet, the immediate risk is moderate but warrants proactive mitigation. The impact is more pronounced in environments with extensive logging and automated log analysis pipelines, common in European enterprises adhering to strict compliance and auditing standards.

Mitigation Recommendations

To mitigate CVE-2025-58189, organizations should prioritize updating the Go runtime and crypto/tls package to a patched version once it becomes available from the Go project. Until an official patch is released, developers should implement manual sanitization of ALPN protocol strings before logging, ensuring that any control characters or escape sequences are neutralized to prevent log injection. Additionally, security teams should enhance log monitoring to detect anomalous or suspicious entries that could indicate exploitation attempts. Employing centralized logging solutions with integrity verification and alerting on unusual patterns can reduce the risk of undetected log tampering. Reviewing and hardening logging configurations to avoid excessive trust in raw log data is recommended. Finally, organizations should conduct code audits of custom Go applications using crypto/tls to identify and remediate any unsafe logging practices related to ALPN or other client-supplied inputs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-08-27T14:50:58.692Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69029404f29b216d6d5e20cf

Added to database: 10/29/2025, 10:24:04 PM

Last enriched: 11/5/2025, 11:23:33 PM

Last updated: 12/12/2025, 4:19:22 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats