A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. This vulnerability allows information disclosure through detailed error messages that may leak sensitive input values via malformed user-supplied data processed in security-critical contexts.

Project Subscriptions

Vendors Products
Advanced Cluster Security Subscribe
Certifications Subscribe
Enterprise Linux Subscribe
Openshift Subscribe
Openshift Ai Subscribe
Openshift Devspaces Subscribe
Openshift Distributed Tracing Subscribe
Openshift Gitops Subscribe
Openshift Pipelines Subscribe
Trusted Application Pipeline Subscribe
Trusted Artifact Signer Subscribe
Zero Trust Workload Identity Manager Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2464-8j7c-4cjm go-viper's mapstructure May Leak Sensitive Information in Logs When Processing Malformed Data
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Tue, 03 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. This vulnerability allows information disclosure through detailed error messages that may leak sensitive input values via malformed user-supplied data processed in security-critical contexts.
Title github.com/go-viper/mapstructure/v2: Go-viper's mapstructure May Leak Sensitive Information in Logs in github.com/go-viper/mapstructure Github.com/go-viper/mapstructure/v2: go-viper's mapstructure may leak sensitive information in logs in github.com/go-viper/mapstructure
First Time appeared Redhat
Redhat acm
Redhat advanced Cluster Security
Redhat certifications
Redhat enterprise Linux
Redhat openshift
Redhat openshift Ai
Redhat openshift Devspaces
Redhat openshift Distributed Tracing
Redhat openshift Gitops
Redhat openshift Pipelines
Redhat trusted Application Pipeline
Redhat trusted Artifact Signer
Redhat zero Trust Workload Identity Manager
CPEs cpe:/a:redhat:acm:2
cpe:/a:redhat:advanced_cluster_security:4
cpe:/a:redhat:certifications:1::el8
cpe:/a:redhat:certifications:9
cpe:/a:redhat:openshift:4
cpe:/a:redhat:openshift_ai
cpe:/a:redhat:openshift_devspaces:3
cpe:/a:redhat:openshift_distributed_tracing:3
cpe:/a:redhat:openshift_gitops:1
cpe:/a:redhat:openshift_pipelines:1
cpe:/a:redhat:trusted_application_pipeline:1
cpe:/a:redhat:trusted_artifact_signer:1
cpe:/a:redhat:zero_trust_workload_identity_manager:0
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat acm
Redhat advanced Cluster Security
Redhat certifications
Redhat enterprise Linux
Redhat openshift
Redhat openshift Ai
Redhat openshift Devspaces
Redhat openshift Distributed Tracing
Redhat openshift Gitops
Redhat openshift Pipelines
Redhat trusted Application Pipeline
Redhat trusted Artifact Signer
Redhat zero Trust Workload Identity Manager
References

Sat, 27 Sep 2025 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title github.com/go-viper/mapstructure/v2: Go-viper's mapstructure May Leak Sensitive Information in Logs in github.com/go-viper/mapstructure
Weaknesses CWE-209
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-03T19:21:17.175Z

Reserved: 2025-09-26T12:01:08.227Z

Link: CVE-2025-11065

cve-icon Vulnrichment

Updated: 2026-02-03T19:21:05.294Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T20:16:06.840

Modified: 2026-02-03T20:15:56.087

Link: CVE-2025-11065

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-08-29T14:52:35Z

Links: CVE-2025-11065 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses