Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-apff-aff9-eueq
Vulnerability ID VCID-apff-aff9-eueq
Aliases CVE-2025-22870
GHSA-qxp5-gwg8-xv66
Summary HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
Status Published
Exploitability None
Weighted Severity None
Risk None
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 4.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22870.json
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00031 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
epss 0.0006 https://api.first.org/data/v1/epss?cve=CVE-2025-22870
cvssv3.1 4.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 4.4 https://go.dev/cl/654697
generic_textual MODERATE https://go.dev/cl/654697
ssvc Track https://go.dev/cl/654697
cvssv3.1 4.4 https://go.dev/issue/71984
generic_textual MODERATE https://go.dev/issue/71984
ssvc Track https://go.dev/issue/71984
cvssv3.1 4.4 https://go-review.googlesource.com/q/project:net
generic_textual MODERATE https://go-review.googlesource.com/q/project:net
cvssv3.1 4.4 https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
generic_textual MODERATE https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
ssvc Track https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
cvssv3.1 4.4 https://nvd.nist.gov/vuln/detail/CVE-2025-22870
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2025-22870
cvssv3.1 4.4 https://pkg.go.dev/vuln/GO-2025-3503
generic_textual MODERATE https://pkg.go.dev/vuln/GO-2025-3503
ssvc Track https://pkg.go.dev/vuln/GO-2025-3503
cvssv3.1 4.4 https://security.netapp.com/advisory/ntap-20250509-0007
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20250509-0007
cvssv3.1 4.4 http://www.openwall.com/lists/oss-security/2025/03/07/2
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2025/03/07/2
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22870.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://go.dev/cl/654697
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T16:31:16Z/ Found at https://go.dev/cl/654697
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://go.dev/issue/71984
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T16:31:16Z/ Found at https://go.dev/issue/71984
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://go-review.googlesource.com/q/project:net
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T16:31:16Z/ Found at https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-22870
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://pkg.go.dev/vuln/GO-2025-3503
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T16:31:16Z/ Found at https://pkg.go.dev/vuln/GO-2025-3503
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at https://security.netapp.com/advisory/ntap-20250509-0007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Found at http://www.openwall.com/lists/oss-security/2025/03/07/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.06273
EPSS Score 0.00023
Published At April 18, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:56:08.648483+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-qxp5-gwg8-xv66/GHSA-qxp5-gwg8-xv66.json 38.0.0