Cross-Origin Redirect Flaw in Go's Proxy Headers
CVE-2025-4673
Key Information:
- Vendor
Go Standard Library
- Status
- Vendor
- CVE Published:
- 11 June 2025
Badges
What is CVE-2025-4673?
CVE-2025-4673 represents a cross-origin redirect vulnerability found within the Go Standard Library, particularly affecting the handling of Proxy-Authorization and Proxy-Authenticate headers. This vulnerability stems from the persistent nature of these headers during cross-origin redirects, which can inadvertently expose sensitive information when users navigate between different domains. Such an occurrence could potentially allow attackers to intercept and exploit user credentials or any other sensitive data being transmitted through these headers, leading to substantial security risks for affected organizations. The use of Go for various web applications and services makes this issue concerning, given its popularity in developing responsive and efficient server-side applications.
Potential impact of CVE-2025-4673
-
Data Leakage: The vulnerability can lead to the leakage of sensitive information, such as authentication tokens or user credentials, during cross-origin requests. This exposure can have serious consequences for user privacy and organizational security.
-
Unauthorized Access: If sensitive data is intercepted, attackers could gain unauthorized access to user accounts and systems, allowing them to exploit this information for malicious purposes, potentially leading to a broader security breach.
-
Reputation Damage: Organizations affected by this vulnerability may suffer reputational harm if sensitive data is leaked or if their user base faces security issues. Trust erosion can result in customer attrition and a decline in future business opportunities.
Affected Version(s)
net/http 0 < 1.23.10
net/http 1.24.0-0 < 1.24.4
References
CVSS V3.1
Timeline
- 📈
Vulnerability started trending
Vulnerability published
Vulnerability Reserved