Vulnerability Description
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | < 1.24.12 |
Related Weaknesses (CWE)
References
- https://go.dev/cl/736713Patch
- https://go.dev/issue/77102Patch
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUcRelease Notes
- https://pkg.go.dev/vuln/GO-2026-4342Vendor Advisory
- http://www.openwall.com/lists/oss-security/2026/01/15/4ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2025-61728?
CVE-2025-61728 is a vulnerability with a CVSS score of 6.5 (MEDIUM). archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructe...
How severe is CVE-2025-61728?
CVE-2025-61728 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61728?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go.