Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html

0
Medium
VulnerabilityCVE-2025-58190cvecve-2025-58190cwe-835
Published: Thu Feb 05 2026 (02/05/2026, 17:48:44 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/net
Product: golang.org/x/net/html

Description

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/13/2026, 06:49:11 UTC

Technical Analysis

CVE-2025-58190 identifies a vulnerability in the golang.org/x/net/html package, specifically within the html.Parse function. This function is responsible for parsing HTML content in Go applications. The vulnerability arises from a loop with an unreachable exit condition (CWE-835), causing the parser to enter an infinite loop when processing certain maliciously crafted HTML inputs. This infinite loop results in a denial of service (DoS) by consuming excessive CPU resources, potentially rendering the affected application or service unresponsive. The vulnerability can be triggered remotely without requiring any authentication or user interaction, as it is exploitable by supplying crafted HTML content to any service that uses this parsing function. The affected versions are unspecified but presumably include all versions prior to the fix, as no patch links are currently provided. No known exploits have been reported in the wild, indicating limited or no active exploitation at this time. The CVSS v3.1 base score is 5.3, reflecting a medium severity level with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:L) without affecting confidentiality or integrity. This vulnerability is particularly relevant for applications that parse untrusted HTML inputs, such as web crawlers, proxy servers, or content sanitizers implemented in Go. The infinite loop can cause service outages or degraded performance, impacting availability and reliability of services relying on this package.

Potential Impact

For European organizations, the primary impact of CVE-2025-58190 is the potential for denial of service attacks against Go-based applications that parse HTML content using the vulnerable golang.org/x/net/html package. This can lead to service outages, degraded performance, and increased operational costs due to resource exhaustion. Organizations providing web services, APIs, or content processing pipelines that accept or handle untrusted HTML inputs are at risk. The vulnerability does not compromise data confidentiality or integrity but can disrupt business continuity and availability of critical services. In sectors such as finance, telecommunications, government, and critical infrastructure, even temporary service disruptions can have significant operational and reputational consequences. Additionally, the ease of exploitation without authentication or user interaction increases the risk of automated or opportunistic attacks. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread exploitation occurs. European entities relying on Go for backend services, cloud-native applications, or microservices architectures should assess their exposure and prioritize remediation to maintain service availability and resilience.

Mitigation Recommendations

1. Monitor official golang.org/x/net/html package repositories and security advisories for the release of a patch addressing CVE-2025-58190 and apply updates promptly once available. 2. Implement input validation to filter or sanitize incoming HTML content before parsing, reducing the risk of triggering the infinite loop. 3. Introduce parsing timeouts or resource limits in applications using html.Parse to prevent indefinite CPU consumption during parsing. 4. Employ runtime monitoring and alerting for abnormal CPU usage patterns in services that parse HTML content, enabling rapid detection of potential exploitation attempts. 5. Where feasible, isolate HTML parsing components in separate processes or containers to limit the blast radius of a DoS condition. 6. Conduct code reviews and security testing focused on input handling and parsing logic in Go applications to identify similar vulnerabilities. 7. Educate developers and DevOps teams about this vulnerability and encourage secure coding practices around third-party library usage. 8. Consider alternative HTML parsing libraries or approaches if immediate patching is not possible, ensuring they do not exhibit similar infinite loop behaviors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-08-27T14:50:58.692Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6984daa9f9fa50a62f30a64f

Added to database: 2/5/2026, 6:00:09 PM

Last enriched: 2/13/2026, 6:49:11 AM

Last updated: 3/22/2026, 9:02:35 PM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses