Golang.Org X Net vulnerabilities
24 known vulnerabilities affecting golang.org/x_net.
Total CVEs
24
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
HIGH13MEDIUM7UNKNOWN4
Vulnerabilities
Page 1 of 2
CVE-2026-27141UNKNOWN≥ 0.50.0, < 0.51.02026-02-26
CVE-2026-27141 Sending certain HTTP/2 frames can cause a server to panic in golang.org/x/net
Sending certain HTTP/2 frames can cause a server to panic in golang.org/x/net
Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic
osv
CVE-2025-47911UNKNOWN≥ 0, < 0.45.02026-02-05
CVE-2025-47911 Quadratic parsing complexity in golang.org/x/net/html
Quadratic parsing complexity in golang.org/x/net/html
The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
osv
CVE-2025-58190UNKNOWN≥ 0, < 0.45.02026-02-05
CVE-2025-58190 Infinite parsing loop in golang.org/x/net
Infinite parsing loop in golang.org/x/net
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
osv
CVE-2025-22872MEDIUM≥ 0, < 0.38.02025-04-16
CVE-2025-22872 [MEDIUM] CWE-79 golang.org/x/net vulnerable to Cross-site Scripting
golang.org/x/net vulnerable to Cross-site Scripting
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM const
ghsaosv
CVE-2025-22870MEDIUM≥ 0, < 0.36.02025-03-12
CVE-2025-22870 [MEDIUM] CWE-115 HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
ghsaosv
CVE-2023-45288MEDIUM≥ 0, < 0.23.02024-04-04
CVE-2023-45288 [MEDIUM] CWE-400 net/http, x/net/http2: close connections when receiving too many headers
net/http, x/net/http2: close connections when receiving too many headers
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to s
ghsaosv
CVE-2023-39325HIGH≥ 0, < 0.17.02023-10-11
CVE-2023-39325 [HIGH] CWE-400 HTTP/2 rapid reset can cause excessive work in net/http
HTTP/2 rapid reset can cause excessive work in net/http
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing.
With t
ghsaosv
CVE-2023-44487MEDIUMKEVPoC≥ 0, < 0.17.02023-10-10
CVE-2023-44487 [MEDIUM] CWE-400 HTTP/2 Stream Cancellation Attack
HTTP/2 Stream Cancellation Attack
## HTTP/2 Rapid reset attack
The HTTP/2 protocol allows clients to indicate to the server that a previous stream should be canceled by sending a RST_STREAM frame. The protocol does not require the client and server to coordinate the cancellation in any way, the client may do it unilaterally. The client may also assume that the cancellation will take effect immediately when the server receives the
ghsaosv
CVE-2018-17846HIGH≥ 0, < 0.0.0-20190125091013-d26f9f9a57f32023-09-25
CVE-2018-17846 [HIGH] CWE-835 x/net/html Vulnerable to DoS During HTML Parsing
x/net/html Vulnerable to DoS During HTML Parsing
The html package (aka x/net/html) through 2018-09-25 in Go mishandles ``, leading to an infinite loop during an `html.Parse` call because `inSelectIM` and `inSelectInTableIM` do not comply with a specification.
ghsaosv
CVE-2023-3978MEDIUM≥ 0, < 0.13.02023-08-02
CVE-2023-3978 [MEDIUM] CWE-79 Improper rendering of text nodes in golang.org/x/net/html
Improper rendering of text nodes in golang.org/x/net/html
Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
ghsaosv
CVE-2022-41723HIGH≥ 0, < 0.7.02023-02-17
CVE-2022-41723 [HIGH] CWE-400 golang.org/x/net vulnerable to Uncontrolled Resource Consumption
golang.org/x/net vulnerable to Uncontrolled Resource Consumption
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
ghsaosv
CVE-2022-41721HIGH≥ 0.0.0-20220524220425-1d687d428aca, < 0.1.1-0.20221104162952-702349b0e8622023-01-14
CVE-2022-41721 [HIGH] CWE-444 golang.org/x/net/http2/h2c vulnerable to request smuggling attack
golang.org/x/net/http2/h2c vulnerable to request smuggling attack
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 re
ghsaosv
CVE-2022-41717MEDIUM≥ 0, < 0.4.02022-12-08
CVE-2022-41717 [MEDIUM] CWE-770 golang.org/x/net/http2 vulnerable to possible excessive memory growth
golang.org/x/net/http2 vulnerable to possible excessive memory growth
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open
ghsaosv
CVE-2022-27664HIGH≥ 0, < 0.0.0-20220906165146-f3363e06e74c2022-09-07
CVE-2022-27664 [HIGH] golang.org/x/net/http2 Denial of Service vulnerability
golang.org/x/net/http2 Denial of Service vulnerability
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
ghsaosv
CVE-2021-44716UNKNOWN≥ 0, < 0.0.0-20211209124913-491a49abca632022-07-15
CVE-2021-44716 Unbounded memory growth in net/http and golang.org/x/net/http2
Unbounded memory growth in net/http and golang.org/x/net/http2
An attacker can cause unbounded memory growth in servers accepting HTTP/2 requests.
osv
CVE-2021-33194HIGH≥ 0, < 0.0.0-20210520170846-37e1c6afe0232022-05-24
CVE-2021-33194 [HIGH] CWE-835 golang.org/x/net/html Infinite Loop vulnerability
golang.org/x/net/html Infinite Loop vulnerability
Go through 1.15.12 and 1.16.x through 1.16.4 has a golang.org/x/net/html infinite loop via crafted ParseFragment input.
ghsaosv
CVE-2019-9512HIGH≥ 0, < 0.0.0-20190813141303-74dc4d7220e72022-05-24
CVE-2019-9512 [HIGH] CWE-400 golang.org/x/net/http vulnerable to ping floods
golang.org/x/net/http vulnerable to ping floods
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
### Specific Go Packages Affected
golang.org/x/net/http2
ghsaosv
CVE-2019-9514HIGH≥ 0, < 0.0.0-20190813141303-74dc4d7220e72022-05-24
CVE-2019-9514 [HIGH] CWE-400 golang.org/x/net/http vulnerable to a reset flood
golang.org/x/net/http vulnerable to a reset flood
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a str
ghsa
CVE-2021-31525MEDIUM≥ 0, < 0.0.0-20210428140749-89ef3d95e7812022-05-24
CVE-2021-31525 [MEDIUM] CWE-674 golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion
golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion
golang.org/x/net/http/httpguts in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
ghsaosv
CVE-2018-17848HIGH≥ 0, < 0.0.0-20190125002852-4b62a64f59f72022-05-13
CVE-2018-17848 [HIGH] CWE-129 golang.org/x/net/html Improper Validation of Array Index vulnerability
golang.org/x/net/html Improper Validation of Array Index vulnerability
The html package (aka `x/net/html`) through 2018-09-25 in Go mishandles , leading to a "panic: runtime error" (index out of range) in (*insertionModeStack).pop in node.go, called from inHeadIM, during an html.Parse call.
ghsa
1 / 2Next →