url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 11 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library net/url
Vendors & Products Go Standard Library
Go Standard Library net/url

Fri, 06 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
Title Incorrect parsing of IPv6 host literals in net/url
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-03-10T13:37:02.459Z

Reserved: 2026-02-05T01:33:41.943Z

Link: CVE-2026-25679

cve-icon Vulnrichment

Updated: 2026-03-10T13:36:57.330Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-06T22:16:00.720

Modified: 2026-03-10T18:18:37.740

Link: CVE-2026-25679

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-06T21:28:14Z

Links: CVE-2026-25679 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-09T10:06:18Z

Weaknesses