Directory Traversal Vulnerability in Go Programming Language
CVE-2025-22873
3.8LOW
Key Information:
- Vendor
Go Standard Library
- Status
- Vendor
- CVE Published:
- 4 February 2026
Badges
📰 News Worthy
What is CVE-2025-22873?
This vulnerability allows unauthorized access to a parent directory of an os.Root by using a filename that ends with '../'. It poses risks as it could potentially expose sensitive information stored within the parent directory. However, this exploit is limited to accessing the direct parent directory only, and does not allow access to its ancestors or the files contained within.
Affected Version(s)
os 0 < 1.23.9
os 1.24.0-0 < 1.24.3
News Articles
CVE-2025-22873 | Ubuntu
Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.
References
CVSS V3.1
Score:
3.8
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
- 📰
First article discovered by Ubuntu
Vulnerability Reserved
Credit
Dan Sebastian Thrane of SDU eScience Center
