Vulnerability Description
parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c8
- https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
- https://github.com/gin-contrib/cors/pull/106
- https://github.com/gin-contrib/cors/pull/57
- https://github.com/gin-contrib/cors/releases/tag/v1.6.0
- https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c8
- https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
- https://github.com/gin-contrib/cors/pull/106
- https://github.com/gin-contrib/cors/pull/57
- https://github.com/gin-contrib/cors/releases/tag/v1.6.0
- https://lists.debian.org/debian-lts-announce/2025/08/msg00024.html
FAQ
What is CVE-2019-25211?
CVE-2019-25211 is a vulnerability with a CVSS score of 9.1 (CRITICAL). parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://...
How severe is CVE-2019-25211?
CVE-2019-25211 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-25211?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.