Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4c5f-9mj4-m247: flagd: Multiple Go Runtime CVEs Impact Security and Availability

Summary

In 2025, several vulnerabilities in the Go Standard Library were disclosed, impacting Go-based applications like flagd (the evaluation engine for OpenFeature). These CVEs primarily focus on Denial of Service (DoS) through resource exhaustion and Race Conditions in database handling.

CVE IDImpacted PackageSeverityDescription & Impact on flagd
CVE-2025-47907database/sql7.0 (High)Race Condition: Canceling a query during a Scan call can return data from the wrong query. Critical if flagd uses SQL-based sync providers (e.g., Postgres), potentially leading to incorrect flag configurations.
CVE-2025-61725net/mail7.5 (High)DoS: Inefficient complexity in ParseAddress. Attackers can provide crafted email strings with large domain literals to exhaust CPU if flagd parses email-formatted metadata.
CVE-2025-61723encoding/pem7.5 (High)DoS: Quadratic complexity when parsing invalid PEM inputs. Relevant if flagd loads TLS certificates or keys via PEM files from untrusted sources.
CVE-2025-61729crypto/x5097.5 (High)Resource Exhaustion: HostnameError.Error() lacks string concatenation limits. A malicious TLS certificate with thousands of hostnames could crash flagd during connection handshakes.
CVE-2025-58188net/httpMediumRequest Smuggling: Improper header handling in HTTP/1.1. Could allow attackers to bypass security filters positioned in front of flagd sync or evaluation APIs.
CVE-2025-58187archive/zipMediumDoS: Improper validation of malformed ZIP archives. Impacts flagd if configured to fetch and unpack zipped configuration bundles from remote providers.
ghsa
#sql#vulnerability#dos#git#postgres#ssl
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-4c5f-9mj4-m247

flagd: Multiple Go Runtime CVEs Impact Security and Availability

High severity GitHub Reviewed Published Jan 2, 2026 in open-feature/flagd • Updated Jan 5, 2026

Package

gomod github.com/open-feature/flagd/core (Go)

Affected versions

< 0.13.1

gomod github.com/open-feature/flagd/flagd (Go)

gomod github.com/open-feature/flagd/flagd-proxy (Go)

Summary

In 2025, several vulnerabilities in the Go Standard Library were disclosed, impacting Go-based applications like flagd (the evaluation engine for OpenFeature). These CVEs primarily focus on Denial of Service (DoS) through resource exhaustion and Race Conditions in database handling.

CVE ID

Impacted Package

Severity

Description & Impact on flagd

CVE-2025-47907

database/sql

7.0 (High)

Race Condition: Canceling a query during a Scan call can return data from the wrong query. Critical if flagd uses SQL-based sync providers (e.g., Postgres), potentially leading to incorrect flag configurations.

CVE-2025-61725

net/mail

7.5 (High)

DoS: Inefficient complexity in ParseAddress. Attackers can provide crafted email strings with large domain literals to exhaust CPU if flagd parses email-formatted metadata.

CVE-2025-61723

encoding/pem

7.5 (High)

DoS: Quadratic complexity when parsing invalid PEM inputs. Relevant if flagd loads TLS certificates or keys via PEM files from untrusted sources.

CVE-2025-61729

crypto/x509

7.5 (High)

Resource Exhaustion: HostnameError.Error() lacks string concatenation limits. A malicious TLS certificate with thousands of hostnames could crash flagd during connection handshakes.

CVE-2025-58188

net/http

Medium

Request Smuggling: Improper header handling in HTTP/1.1. Could allow attackers to bypass security filters positioned in front of flagd sync or evaluation APIs.

CVE-2025-58187

archive/zip

Medium

DoS: Improper validation of malformed ZIP archives. Impacts flagd if configured to fetch and unpack zipped configuration bundles from remote providers.

References

  • GHSA-4c5f-9mj4-m247
  • open-feature/flagd#1840
  • https://github.com/open-feature/flagd/releases/tag/core%2Fv0.13.1

Published to the GitHub Advisory Database

Jan 5, 2026

ghsa: Latest News

GHSA-3573-4c68-g8cc: Directus has open redirect in SAML