Excessive CPU Consumption in Golang's Response Handling
CVE-2025-61724

5.3MEDIUM

Key Information:

Vendor
CVE Published:
29 October 2025

What is CVE-2025-61724?

The Reader.ReadResponse function in the Golang Standard Library exhibits a vulnerability due to inefficient string concatenation. This occurs when processing a response with a large number of lines, leading to excessive CPU consumption as the system struggles to handle the demand. As more lines are added, the performance degradation intensifies, posing risks for applications relying on this function, particularly under heavy loads. Developers should review their implementations and optimize response handling to mitigate potential impacts.

Affected Version(s)

net/textproto 0 < 1.24.8

net/textproto 1.25.0 < 1.25.2

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jakub Ciolek
.