CVE-2025-22868Improper Validation of Syntactic Correctness of Input in X Oauth2 Golang.org X Oauth2 JWS

Severity
7.5HIGHNVD
EPSS
0.2%
top 61.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 26
Latest updateJul 18

Description

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages27 packages

Patches

🔴Vulnerability Details

6
GHSA
golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability2025-07-18
OSV
golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability2025-07-18
OSV
Unexpected memory consumption during token parsing in golang.org/x/oauth22025-02-26
OSV
CVE-2025-22868: An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing2025-02-26
GHSA
DoS in go-jose Parsing2025-02-24

📋Vendor Advisories

3
Red Hat
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws2025-02-26
Microsoft
Unexpected memory consumption during token parsing in golang.org/x/oauth22025-02-11
Debian
CVE-2025-22868: golang-golang-x-oauth2 - An attacker can pass a malicious malformed token which causes unexpected memory ...2025