Description The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Exploitability: 3.9 | Impact: 3.6 Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: None
Availability: High
Affected Packages25 packages Show 20 more packages
🔴 Vulnerability Details5 GHSA flagd: Multiple Go Runtime CVEs Impact Security and Availability ↗ 2026-01-05 ▶ OSV flagd: Multiple Go Runtime CVEs Impact Security and Availability ↗ 2026-01-05 ▶ GHSA GHSA-qh38-484v-w52x: The ParseAddress function constructeds domain-literal address components through repeated string concatenation ↗ 2025-10-30 ▶ OSV CVE-2025-61725: The ParseAddress function constructs domain-literal address components through repeated string concatenation ↗ 2025-10-29 ▶ OSV Excessive CPU consumption in ParseAddress in net/mail ↗ 2025-10-29 ▶
📋 Vendor Advisories3 Red Hat net/mail: Excessive CPU consumption in ParseAddress in net/mail ↗ 2025-10-29 ▶ Microsoft Excessive CPU consumption in ParseAddress in net/mail ↗ 2025-10-14 ▶ Debian CVE-2025-61725: golang-1.15 - The ParseAddress function constructs domain-literal address components through r... ↗ 2025 ▶
🕵️ Threat Intelligence1 Wiz GHSA-4c5f-9mj4-m247 Impact, Exploitability, and Mitigation Steps | Wiz ↗ ▶
💬 Community3 Bugzilla CVE-2025-61725 docker-distribution: Excessive CPU consumption in ParseAddress in net/mail [fedora-43] ↗ 2025-10-30 ▶ Bugzilla CVE-2025-61725 docker-distribution: Excessive CPU consumption in ParseAddress in net/mail [fedora-42] ↗ 2025-10-30 ▶ Bugzilla CVE-2025-61725 trivy: Excessive CPU consumption in ParseAddress in net/mail [fedora-43] ↗ 2025-10-30 ▶