Vulnerability Description
nosurf is cross-site request forgery (CSRF) protection middleware for Go. A vulnerability in versions prior to 1.2.0 allows an attacker who controls content on the target site, or on a subdomain of the target site (either via XSS, or otherwise) to bypass CSRF checks and issue requests on user's behalf. Due to misuse of the Go `net/http` library, nosurf categorizes all incoming requests as plain-text HTTP requests, in which case the `Referer` header is not checked to have the same origin as the target webpage. If the attacker has control over HTML contents on either the target website (e.g. `example.com`), or on a website hosted on a subdomain of the target (e.g. `attacker.example.com`), they will also be able to manipulate cookies set for the target website. By acquiring the secret CSRF token from the cookie, or overriding the cookie with a new token known to the attacker, `attacker.example.com` is able to craft cross-site requests to `example.com`. A patch for the issue was released in nosurf 1.2.0. In lieu of upgrading to a patched version of nosurf, users may additionally use another HTTP middleware to ensure that a non-safe HTTP request is coming from the same origin (e.g. by requiring a `Sec-Fetch-Site: same-origin` header in the request).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nosurf Project | Nosurf | < 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/advisories/GHSA-rq77-p4h8-4crwNot Applicable
- https://github.com/justinas/nosurf-cve-2025-46721ExploitThird Party Advisory
- https://github.com/justinas/nosurf/commit/ec9bb776d8e5ba9e906b6eb70428f4e7b009fePatch
- https://github.com/justinas/nosurf/releases/tag/v1.2.0Release Notes
- https://github.com/justinas/nosurf/security/advisories/GHSA-w9hf-35q4-vcjwVendor Advisory
- https://github.com/advisories/GHSA-rq77-p4h8-4crwNot Applicable
FAQ
What is CVE-2025-46721?
CVE-2025-46721 is a vulnerability with a CVSS score of 6.1 (MEDIUM). nosurf is cross-site request forgery (CSRF) protection middleware for Go. A vulnerability in versions prior to 1.2.0 allows an attacker who controls content on the target site, or on a subdomain of th...
How severe is CVE-2025-46721?
CVE-2025-46721 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46721?
Check the references section above for vendor advisories and patch information. Affected products include: Nosurf Project Nosurf.