CVE-2025-68119Out-of-bounds Write in Toolchain CMD GO

Severity
7.0HIGHNVD
EPSS
0.0%
top 95.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 28

Description

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages2 packages

CVEListV5go_toolchain/cmd_go1.25.01.25.6
NVDgolang/go1.25.01.25.6+1

Patches

🔴Vulnerability Details

4
CVEList
Unexpected code execution when invoking toolchain in cmd/go2026-01-28
OSV
Unexpected code execution when invoking toolchain in cmd/go2026-01-28
OSV
CVE-2025-68119: Downloading and building modules with malicious version strings can cause local code execution2026-01-28
GHSA
GHSA-cm6p-qc7v-m3jw: Downloading and building modules with malicious version strings can cause local code execution2026-01-28

📋Vendor Advisories

2
Red Hat
cmd/go: cmd/go: Local code execution and arbitrary file write via malicious module version strings2026-01-28
Debian
CVE-2025-68119: golang-1.15 - Downloading and building modules with malicious version strings can cause local ...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-68119 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-68119 — Out-of-bounds Write | cvebase