Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/open-feature/flagd/core
  4. ›
  5. GHSA-4c5f-9mj4-m247

GHSA-4c5f-9mj4-m247: flagd: Multiple Go Runtime CVEs Impact Security and Availability

January 5, 2026

In 2025, several vulnerabilities in the Go Standard Library were disclosed, impacting Go-based applications like flagd (the evaluation engine for OpenFeature). These CVEs primarily focus on Denial of Service (DoS) through resource exhaustion and Race Conditions in database handling.

CVE IDImpacted PackageSeverityDescription & Impact on flagd
CVE-2025-47907database/sql7.0 (High)Race Condition: Canceling a query during a Scan call can return data from the wrong query. Critical if flagd uses SQL-based sync providers (e.g., Postgres), potentially leading to incorrect flag configurations.
CVE-2025-61725net/mail7.5 (High)DoS: Inefficient complexity in ParseAddress. Attackers can provide crafted email strings with large domain literals to exhaust CPU if flagd parses email-formatted metadata.
CVE-2025-61723encoding/pem7.5 (High)DoS: Quadratic complexity when parsing invalid PEM inputs. Relevant if flagd loads TLS certificates or keys via PEM files from untrusted sources.
CVE-2025-61729crypto/x5097.5 (High)Resource Exhaustion: HostnameError.Error() lacks string concatenation limits. A malicious TLS certificate with thousands of hostnames could crash flagd during connection handshakes.
CVE-2025-58188net/httpMediumRequest Smuggling: Improper header handling in HTTP/1.1. Could allow attackers to bypass security filters positioned in front of flagd sync or evaluation APIs.
CVE-2025-58187archive/zipMediumDoS: Improper validation of malformed ZIP archives. Impacts flagd if configured to fetch and unpack zipped configuration bundles from remote providers.

References

  • github.com/advisories/GHSA-4c5f-9mj4-m247
  • github.com/open-feature/flagd
  • github.com/open-feature/flagd/pull/1840
  • github.com/open-feature/flagd/releases/tag/core%2Fv0.13.1
  • github.com/open-feature/flagd/security/advisories/GHSA-4c5f-9mj4-m247

Code Behaviors & Features

Detect and mitigate GHSA-4c5f-9mj4-m247 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.13.1

Fixed versions

  • 0.13.1

Solution

Upgrade to version 0.13.1 or above.

Weakness

  • CWE-20: Improper Input Validation
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • CWE-400: Uncontrolled Resource Consumption
  • CWE-407: Inefficient Algorithmic Complexity
  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/github.com/open-feature/flagd/core/GHSA-4c5f-9mj4-m247.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:34:56 +0000.