Vulnerability Report: GO-2025-3968
- CVE-2025-59346, GHSA-g2rq-jv54-wcpr
- Affects: d7y.io/dragonfly/v2, github.com/dragonflyoss/dragonfly
- Published: Sep 24, 2025
- Unreviewed
Dragonfly vulnerable to server-side request forgery in d7y.io/dragonfly
For detailed information about this vulnerability, visit https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-g2rq-jv54-wcpr or https://nvd.nist.gov/vuln/detail/CVE-2025-59346.
Affected Modules
-
PathGo Versions
-
before v2.1.0
-
all versions, no known fixed
Aliases
References
- https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-g2rq-jv54-wcpr
- https://nvd.nist.gov/vuln/detail/CVE-2025-59346
- https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf
- https://vuln.go.dev/ID/GO-2025-3968.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.