The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
References
| Link | Resource |
|---|---|
| https://go.dev/cl/686515 | Patch |
| https://go.dev/issue/74380 | Issue Tracking Third Party Advisory |
| https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 | Mailing List Release Notes |
| https://pkg.go.dev/vuln/GO-2025-3828 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/07/08/5 | Mailing List Release Notes |
Configurations
History
No history.
Information
Published : 2025-07-29 22:15
Updated : 2026-01-29 19:15
NVD link : CVE-2025-4674
Mitre link : CVE-2025-4674
CVE.ORG link : CVE-2025-4674
JSON object : View
Products Affected
golang
- go
CWE
CWE-73
External Control of File Name or Path
