The ParseAddress function constructeds domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 30 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang mail
Vendors & Products Golang
Golang mail

Wed, 29 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
Description The ParseAddress function constructeds domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
Title Excessive CPU consumption in ParseAddress in net/mail
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-11-04T21:14:05.236Z

Reserved: 2025-09-30T15:05:03.605Z

Link: CVE-2025-61725

cve-icon Vulnrichment

Updated: 2025-11-04T21:14:05.236Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T23:16:20.113

Modified: 2025-11-04T22:16:36.693

Link: CVE-2025-61725

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-29T22:10:12Z

Links: CVE-2025-61725 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T14:37:36Z