Vulnerability Description
The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
CVSS Score
HIGH
References
- https://go.dev/cl/709860
- https://go.dev/issue/75680
- https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI
- https://pkg.go.dev/vuln/GO-2025-4006
- http://www.openwall.com/lists/oss-security/2025/10/08/1
FAQ
What is CVE-2025-61725?
CVE-2025-61725 is a vulnerability with a CVSS score of 7.5 (HIGH). The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
How severe is CVE-2025-61725?
CVE-2025-61725 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61725?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.