Golang 1.25.x < 1.25.6 Multiple Vulnerabilities

high Nessus Plugin ID 294961

Synopsis

An application installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Golang running on the remote host is 1.25.x prior to 1.25.6. It is, therefore, affected by multiple vulnerabilities as referenced in advisory.

- bypass of flag sanitization can lead to arbitrary code execution. (CVE-2025-61731)

- unexpected code execution when invoking toolchain. (CVE-2025-68119)

- crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain(CVE-2025-68121)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Golang Go version 1.25.6 or later.

See Also

http://www.nessus.org/u?eb2c50e3

https://github.com/golang/go/issues/77108

https://github.com/golang/go/issues/77110

https://github.com/golang/go/issues/76443

https://github.com/golang/go/issues/77106

https://github.com/golang/go/issues/77104

https://github.com/golang/go/issues/77115

Plugin Details

Severity: High

ID: 294961

File Name: golang_1_25_6.nasl

Version: 1.1

Type: local

Family: Misc.

Published: 1/22/2026

Updated: 1/22/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2025-68121

CVSS v3

Risk Factor: High

Base Score: 7.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:golang:go

Required KB Items: installed_sw/Golang Go Programming Language

Patch Publication Date: 1/16/2026

Vulnerability Publication Date: 1/16/2026

Reference Information

CVE: CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61731, CVE-2025-68119, CVE-2025-68121