Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61726: CWE-400: Uncontrolled Resource Consumption in Go standard library net/url

0
High
VulnerabilityCVE-2025-61726cvecve-2025-61726cwe-400
Published: Wed Jan 28 2026 (01/28/2026, 19:30:31 UTC)
Source: CVE Database V5
Vendor/Project: Go standard library
Product: net/url

Description

CVE-2025-61726 is a high-severity vulnerability in the Go standard library's net/url package, involving uncontrolled resource consumption due to the lack of limits on the number of query parameters parsed. This can lead to excessive memory usage when parsing large URL-encoded forms with many unique parameters via net/http. Request. ParseForm. The vulnerability affects all Go versions up to 1. 25. 0 and can be exploited remotely without authentication or user interaction. While no known exploits are currently in the wild, successful exploitation can cause denial of service by exhausting server memory. European organizations using Go-based web services are at risk, especially those handling large or untrusted HTTP requests. Mitigation involves implementing strict limits on query parameters at the application or middleware level and upgrading Go versions once patches are released.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:51:26 UTC

Technical Analysis

CVE-2025-61726 identifies a vulnerability in the Go programming language's standard library, specifically within the net/url package. The issue arises because the package does not impose any limit on the number of query parameters that can be parsed from a URL. Although the maximum size of query parameters is generally constrained by the maximum request header size, the net/http.Request.ParseForm method can parse very large URL-encoded forms containing numerous unique query parameters. This can lead to uncontrolled resource consumption, particularly excessive memory usage, when processing such requests. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that an attacker can craft a URL with an extremely large number of query parameters to cause the target server to consume excessive memory resources. This can result in denial of service (DoS) conditions by exhausting available memory, potentially crashing the application or severely degrading its performance. The vulnerability affects all Go versions from the initial release up to version 1.25.0. It can be exploited remotely over the network without requiring any authentication or user interaction, making it a significant risk for publicly accessible Go-based web services. Although no known exploits have been reported in the wild as of the publication date, the high CVSS score of 7.5 reflects the potential impact and ease of exploitation. No official patches or fixes are currently linked, so users must rely on mitigation strategies until an update is released.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the availability and reliability of web services developed using the Go programming language. Many modern cloud-native applications, microservices, and APIs in Europe leverage Go for its performance and concurrency features. An attacker exploiting this vulnerability can cause denial of service by overwhelming the server's memory, leading to application crashes or degraded service performance. This can disrupt business operations, cause financial losses, and damage reputation. Critical sectors such as finance, healthcare, telecommunications, and government services that rely on Go-based infrastructure are particularly vulnerable. Additionally, the lack of authentication or user interaction requirements means that automated attacks or bots can easily exploit this flaw at scale. The impact is amplified in environments where input validation or request size limitations are not properly enforced. Given the increasing adoption of Go in European technology stacks, the vulnerability could affect a wide range of organizations from startups to large enterprises and public sector entities.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several practical mitigations to reduce risk. First, enforce strict limits on the number of query parameters accepted by web applications or API gateways, rejecting requests that exceed reasonable thresholds. This can be done at the application layer or via reverse proxies and web application firewalls (WAFs). Second, implement request size limits and timeout settings to prevent resource exhaustion from large or slow requests. Third, monitor application logs and metrics for unusual spikes in query parameter counts or memory usage to detect potential exploitation attempts early. Fourth, consider deploying rate limiting and IP reputation filtering to reduce exposure to automated attacks. Fifth, review and update input validation routines to sanitize and constrain incoming URL parameters. Finally, plan to upgrade to a patched version of the Go standard library as soon as it becomes available, and test applications thoroughly to ensure compatibility. Organizations should also maintain incident response readiness to quickly mitigate any denial of service events stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2025-09-30T15:05:03.605Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a653b4623b1157cea4ed4

Added to database: 1/28/2026, 7:36:27 PM

Last enriched: 2/5/2026, 8:51:26 AM

Last updated: 2/7/2026, 12:59:24 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats