CVE-2025-4674
Published: July 18, 2025Last modified: August 21, 2025
Description
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.6 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | REQUIRED |
Scope | CHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | go | Fixed (1.23.11-r0) |
25 LTS | go | Fixed (1.24.6-r0) | |
Stream | go | Fixed (1.24.5-r0) | |
Hardened Containers | 23 LTS | go | Fixed (1.23.11-r0) |
Stream | go | Fixed (1.24.5-r0) |