Skip to content

Trivy Vulnerability Report for branch private/soc2#23

Open
github-actions[bot] wants to merge 1 commit intoprivate/soc2from
auto/trivy-scan/private-soc2
Open

Trivy Vulnerability Report for branch private/soc2#23
github-actions[bot] wants to merge 1 commit intoprivate/soc2from
auto/trivy-scan/private-soc2

Conversation

@github-actions
Copy link

@github-actions github-actions bot commented Jan 1, 2026

🛡️ Trivy Scan Report for branch private/soc2

  • File: go.mod
    • Vulnerability ID: CVE-2025-22868
    • Pkg: golang.org/x/oauth2 v0.21.0
    • Severity: HIGH
    • Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

Copy link

@windsurf-bot windsurf-bot bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 To request another review, post a new comment with "/windsurf-review".

Comment on lines +1564 to +1626
{
"VulnerabilityID": "CVE-2025-22868",
"PkgID": "golang.org/x/oauth2@v0.21.0",
"PkgName": "golang.org/x/oauth2",
"PkgIdentifier": {
"PURL": "pkg:golang/golang.org/x/oauth2@v0.21.0",
"UID": "7bbd309baa312dbe"
},
"InstalledVersion": "v0.21.0",
"FixedVersion": "0.27.0",
"Status": "fixed",
"SeveritySource": "ghsa",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-22868",
"DataSource": {
"ID": "ghsa",
"Name": "GitHub Security Advisory Go",
"URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Ago"
},
"Fingerprint": "sha256:1fdf23d35641f9a74feac81e41264f6a2f343c4aff2df1b168b3ffeefaa29681",
"Title": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws",
"Description": "An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.",
"Severity": "HIGH",
"CweIDs": [
"CWE-1286"
],
"VendorSeverity": {
"amazon": 3,
"azure": 3,
"cbl-mariner": 3,
"ghsa": 3,
"redhat": 3,
"rocky": 3
},
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"V3Score": 7.5
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2025-22868",
"https://bugzilla.redhat.com/show_bug.cgi?id=2347423",
"https://bugzilla.redhat.com/show_bug.cgi?id=2348366",
"https://bugzilla.redhat.com/show_bug.cgi?id=2352914",
"https://bugzilla.redhat.com/show_bug.cgi?id=2354195",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27144",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29786",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204",
"https://errata.rockylinux.org/RLSA-2025:7479",
"https://go.dev/cl/652155",
"https://go.dev/issue/71490",
"https://nvd.nist.gov/vuln/detail/CVE-2025-22868",
"https://pkg.go.dev/vuln/GO-2025-3488",
"https://www.cve.org/CVERecord?id=CVE-2025-22868"
],
"PublishedDate": "2025-02-26T08:14:24.897Z",
"LastModifiedDate": "2025-05-01T19:27:10.43Z"
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Trivy scan has identified a HIGH severity vulnerability (CVE-2025-22868) in golang.org/x/oauth2 v0.21.0. This vulnerability allows attackers to cause unexpected memory consumption during token parsing, potentially leading to denial of service.

Recommendation: Update golang.org/x/oauth2 to version 0.27.0 or later which contains the fix for this issue.

@github-actions github-actions bot force-pushed the auto/trivy-scan/private-soc2 branch from c6235ba to a22022a Compare January 3, 2026 15:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant