Skip to content

Commit 4df1a1a

Browse files
thatnealpatelgopherbot
authored andcommitted
data/reports: add GO-2025-3585
- data/reports/GO-2025-3585.yaml Fixes #3585 Change-Id: I0b05388f44cd7bfa56ef4bf4d8aeb2ff70023a88 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/661837 Reviewed-by: Damien Neil <[email protected]> Commit-Queue: Neal Patel <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Neal Patel <[email protected]>
1 parent c183779 commit 4df1a1a

File tree

2 files changed

+102
-0
lines changed

2 files changed

+102
-0
lines changed

Diff for: data/osv/GO-2025-3585.json

+74
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3585",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-30223",
8+
"GHSA-2j42-h78h-q4fg"
9+
],
10+
"summary": "Beego allows Reflected/Stored XSS in Beego's RenderForm() Function Due to Unescaped User Input in github.com/beego/beego",
11+
"details": "Beego allows Reflected/Stored XSS in Beego's RenderForm() Function Due to Unescaped User Input in github.com/beego/beego",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/beego/beego",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
}
25+
]
26+
}
27+
],
28+
"ecosystem_specific": {}
29+
},
30+
{
31+
"package": {
32+
"name": "github.com/beego/beego/v2",
33+
"ecosystem": "Go"
34+
},
35+
"ranges": [
36+
{
37+
"type": "SEMVER",
38+
"events": [
39+
{
40+
"introduced": "0"
41+
},
42+
{
43+
"fixed": "2.3.6"
44+
}
45+
]
46+
}
47+
],
48+
"ecosystem_specific": {
49+
"imports": [
50+
{
51+
"path": "github.com/beego/beego/v2/server/web",
52+
"symbols": [
53+
"renderFormField"
54+
]
55+
}
56+
]
57+
}
58+
}
59+
],
60+
"references": [
61+
{
62+
"type": "ADVISORY",
63+
"url": "https://github.com/beego/beego/security/advisories/GHSA-2j42-h78h-q4fg"
64+
},
65+
{
66+
"type": "FIX",
67+
"url": "https://github.com/beego/beego/commit/939bb18c66406466715ddadd25dd9ffa6f169e25"
68+
}
69+
],
70+
"database_specific": {
71+
"url": "https://pkg.go.dev/vuln/GO-2025-3585",
72+
"review_status": "REVIEWED"
73+
}
74+
}

Diff for: data/reports/GO-2025-3585.yaml

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
id: GO-2025-3585
2+
modules:
3+
- module: github.com/beego/beego
4+
vulnerable_at: 1.12.14
5+
- module: github.com/beego/beego/v2
6+
versions:
7+
- fixed: 2.3.6
8+
vulnerable_at: 2.3.5
9+
packages:
10+
- package: github.com/beego/beego/v2/server/web
11+
symbols:
12+
- renderFormField
13+
summary: |-
14+
Beego allows Reflected/Stored XSS in Beego's RenderForm() Function Due to
15+
Unescaped User Input in github.com/beego/beego
16+
cves:
17+
- CVE-2025-30223
18+
ghsas:
19+
- GHSA-2j42-h78h-q4fg
20+
references:
21+
- advisory: https://github.com/beego/beego/security/advisories/GHSA-2j42-h78h-q4fg
22+
- fix: https://github.com/beego/beego/commit/939bb18c66406466715ddadd25dd9ffa6f169e25
23+
notes:
24+
- No patched version exists for github.com/beego/beego
25+
source:
26+
id: GHSA-2j42-h78h-q4fg
27+
created: 2025-03-31T13:59:23.508609-04:00
28+
review_status: REVIEWED

0 commit comments

Comments
 (0)