Go Standard Library Os vulnerabilities

4 known vulnerabilities affecting go_standard_library/os.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM1LOW2

Vulnerabilities

Page 1 of 1
CVE-2026-27139LOWCVSS 2.5fixed in 1.25.8≥ 1.26.0-0, < 1.26.12026-03-06
CVE-2026-27139 [LOW] CVE-2026-27139: On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the r On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside th
cvelistv5nvd
CVE-2025-22873LOWCVSS 3.8fixed in 1.23.9≥ 1.24.0-0, < 1.24.32026-02-04
CVE-2025-22873 [LOW] CWE-23 CVE-2025-22873: It was possible to improperly access the parent directory of an os.Root by opening a filename ending It was possible to improperly access the parent directory of an os.Root by opening a filename ending in "../". For example, Root.Open("../") would open the parent directory of the Root. This escape only permits opening the parent directory itself, not ancestors of the parent or files contained within the parent.
cvelistv5nvd
CVE-2025-0913MEDIUMCVSS 5.5fixed in 1.23.10≥ 1.24.0-0, < 1.24.42025-06-11
CVE-2025-0913 [MEDIUM] CWE-59 CVE-2025-0913: os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the targe os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always r
cvelistv5nvd
CVE-2022-41720HIGHCVSS 7.5fixed in 1.18.9≥ 1.19.0-0, < 1.19.42022-12-07
CVE-2022-41720 [HIGH] CWE-22 CVE-2022-41720: On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and ht On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide
cvelistv5nvd