#VU124118 Input validation error in Go programming language - CVE-2026-25679
Published: March 19, 2026
Go programming language
Description
The vulnerability allows a remote attacker to bypass URL parsing validation and potentially access unintended resources.
The vulnerability exists due to insufficient validation in net/url.Parse when handling IPv6 literals not located at the start of the host component. A remote attacker can send a specially crafted URL with an IPv6 literal preceded by garbage characters to bypass proper parsing and potentially redirect requests.
This issue affects any application using net/url.Parse to process untrusted URLs. The incorrect parsing may lead to misrouting or injection of unintended host components.