The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 06 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang go
CPEs cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Vendors & Products Golang
Golang go

Tue, 03 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

threat_severity

Important


Fri, 30 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library net/url
Vendors & Products Go Standard Library
Go Standard Library net/url

Wed, 28 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
Title Memory exhaustion in query parameter parsing in net/url
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-01-29T18:31:59.685Z

Reserved: 2025-09-30T15:05:03.605Z

Link: CVE-2025-61726

cve-icon Vulnrichment

Updated: 2026-01-29T18:31:55.540Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T20:16:09.713

Modified: 2026-02-06T18:47:34.520

Link: CVE-2025-61726

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-28T19:30:31Z

Links: CVE-2025-61726 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-01-29T09:08:59Z

Weaknesses