Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
History

Thu, 30 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang net
Vendors & Products Golang
Golang net

Wed, 29 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
Description Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
Title Lack of limit when parsing cookies can cause memory exhaustion in net/http
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published: 2025-10-29T22:10:13.912Z

Updated: 2025-10-30T14:24:50.235Z

Reserved: 2025-08-27T14:50:58.691Z

Link: CVE-2025-58186

cve-icon Vulnrichment

Updated: 2025-10-30T14:24:38.946Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T23:16:19.547

Modified: 2025-10-30T15:15:40.070

Link: CVE-2025-58186

cve-icon Redhat

No data.