CVE-2025-61725

Name
CVE-2025-61725
Description
The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security@golang.org https://go.dev/cl/709860
security@golang.org https://go.dev/issue/75680
security@golang.org https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI
security@golang.org https://pkg.go.dev/vuln/GO-2025-4006
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/10/08/1

Match rules

CPE URI Source package Min version Max version
net/mail >= 0 < 1.24.8
net/mail >= 1.25.0 < 1.25.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
go edge-community 1.25.2-r0 Achill Gilgenast <achill@achill.org> fixed
go 3.22-community 1.24.8-r0 None fixed