CVE-2025-4674

The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
References
Link Resource
https://go.dev/cl/686515 Patch
https://go.dev/issue/74380 Issue Tracking Third Party Advisory
https://groups.google.com/g/golang-announce/c/gTNJnDXmn34 Mailing List Release Notes
https://pkg.go.dev/vuln/GO-2025-3828 Vendor Advisory
http://www.openwall.com/lists/oss-security/2025/07/08/5 Mailing List Release Notes
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-29 22:15

Updated : 2026-01-29 19:15


NVD link : CVE-2025-4674

Mitre link : CVE-2025-4674

CVE.ORG link : CVE-2025-4674


JSON object : View

Products Affected

golang

  • go
CWE
CWE-73

External Control of File Name or Path