data/reports: add 4 reports
- data/reports/GO-2025-3704.yaml
- data/reports/GO-2025-3705.yaml
- data/reports/GO-2025-3706.yaml
- data/reports/GO-2025-3707.yaml
Fixes golang/vulndb#3704
Fixes golang/vulndb#3705
Fixes golang/vulndb#3706
Fixes golang/vulndb#3707
Change-Id: Ia34751628fee16ef932b3a3066702128a13d5abd
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/675876
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Auto-Submit: Neal Patel <nealpatel@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
diff --git a/data/osv/GO-2025-3704.json b/data/osv/GO-2025-3704.json
new file mode 100644
index 0000000..85a5625
--- /dev/null
+++ b/data/osv/GO-2025-3704.json
@@ -0,0 +1,67 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3704",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-4123",
+ "GHSA-q53q-gxq9-mgrj"
+ ],
+ "summary": "Grafana Cross-Site-Scripting (XSS) via custom loaded frontend plugin in github.com/grafana/grafana",
+ "details": "Grafana Cross-Site-Scripting (XSS) via custom loaded frontend plugin in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v0.0.0-20250521183405-c7a690348df7.",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/grafana/grafana",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {
+ "custom_ranges": [
+ {
+ "type": "ECOSYSTEM",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "0.0.0-20250521183405-c7a690348df7"
+ }
+ ]
+ }
+ ]
+ }
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/advisories/GHSA-q53q-gxq9-mgrj"
+ },
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4123"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/grafana/grafana/commit/c7a690348df761d41b659224cbc50a46a0c0e4cc"
+ },
+ {
+ "type": "WEB",
+ "url": "https://grafana.com/security/security-advisories/cve-2025-4123"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3704",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3705.json b/data/osv/GO-2025-3705.json
new file mode 100644
index 0000000..2a11c74
--- /dev/null
+++ b/data/osv/GO-2025-3705.json
@@ -0,0 +1,52 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3705",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-48374",
+ "GHSA-c37v-3c8w-crq8"
+ ],
+ "summary": "zot logs secrets in zotregistry.dev/zot",
+ "details": "zot logs secrets in zotregistry.dev/zot",
+ "affected": [
+ {
+ "package": {
+ "name": "zotregistry.dev/zot",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "1.4.4-0.20250522160828-8a99a3ed231f"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/project-zot/zot/security/advisories/GHSA-c37v-3c8w-crq8"
+ },
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48374"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/project-zot/zot/commit/8a99a3ed231fdcd8467e986182b4705342b6a15e"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3705",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3706.json b/data/osv/GO-2025-3706.json
new file mode 100644
index 0000000..08476a1
--- /dev/null
+++ b/data/osv/GO-2025-3706.json
@@ -0,0 +1,74 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3706",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-48075",
+ "GHSA-hg3g-gphw-5hhm"
+ ],
+ "summary": "Fiber panics when fiber.Ctx.BodyParser parses invalid range index in github.com/gofiber/fiber",
+ "details": "Fiber panics when fiber.Ctx.BodyParser parses invalid range index in github.com/gofiber/fiber",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/gofiber/fiber",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/gofiber/fiber/v2",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "2.52.6"
+ },
+ {
+ "fixed": "2.52.7"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {
+ "imports": [
+ {
+ "path": "github.com/gofiber/fiber/v2/internal/schema",
+ "symbols": [
+ "Decoder.Decode"
+ ]
+ }
+ ]
+ }
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/gofiber/fiber/security/advisories/GHSA-hg3g-gphw-5hhm"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/gofiber/fiber/commit/e115c08b8f059a4a031b492aa9eef0712411853d"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3706",
+ "review_status": "REVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3707.json b/data/osv/GO-2025-3707.json
new file mode 100644
index 0000000..e4ed3bd
--- /dev/null
+++ b/data/osv/GO-2025-3707.json
@@ -0,0 +1,51 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3707",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-48371"
+ ],
+ "summary": "OpenFGA Authorization Bypass in github.com/openfga/openfga",
+ "details": "OpenFGA Authorization Bypass in github.com/openfga/openfga",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/openfga/openfga",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "1.8.0"
+ },
+ {
+ "fixed": "1.8.13"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48371"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/openfga/openfga/commit/e5960d4eba92b723de8ff3a5346a07f50c1379ca"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/openfga/openfga/security/advisories/GHSA-c72g-53hw-82q7"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3707",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3704.yaml b/data/reports/GO-2025-3704.yaml
new file mode 100644
index 0000000..741f6bd
--- /dev/null
+++ b/data/reports/GO-2025-3704.yaml
@@ -0,0 +1,20 @@
+id: GO-2025-3704
+modules:
+ - module: github.com/grafana/grafana
+ non_go_versions:
+ - fixed: 0.0.0-20250521183405-c7a690348df7
+ vulnerable_at: 5.4.5+incompatible
+summary: Grafana Cross-Site-Scripting (XSS) via custom loaded frontend plugin in github.com/grafana/grafana
+cves:
+ - CVE-2025-4123
+ghsas:
+ - GHSA-q53q-gxq9-mgrj
+references:
+ - advisory: https://github.com/advisories/GHSA-q53q-gxq9-mgrj
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-4123
+ - fix: https://github.com/grafana/grafana/commit/c7a690348df761d41b659224cbc50a46a0c0e4cc
+ - web: https://grafana.com/security/security-advisories/cve-2025-4123
+source:
+ id: GHSA-q53q-gxq9-mgrj
+ created: 2025-05-23T11:19:56.523795-04:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3705.yaml b/data/reports/GO-2025-3705.yaml
new file mode 100644
index 0000000..014f073
--- /dev/null
+++ b/data/reports/GO-2025-3705.yaml
@@ -0,0 +1,19 @@
+id: GO-2025-3705
+modules:
+ - module: zotregistry.dev/zot
+ versions:
+ - fixed: 1.4.4-0.20250522160828-8a99a3ed231f
+ vulnerable_at: 1.4.3
+summary: zot logs secrets in zotregistry.dev/zot
+cves:
+ - CVE-2025-48374
+ghsas:
+ - GHSA-c37v-3c8w-crq8
+references:
+ - advisory: https://github.com/project-zot/zot/security/advisories/GHSA-c37v-3c8w-crq8
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48374
+ - web: https://github.com/project-zot/zot/commit/8a99a3ed231fdcd8467e986182b4705342b6a15e
+source:
+ id: GHSA-c37v-3c8w-crq8
+ created: 2025-05-23T11:19:51.572769-04:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3706.yaml b/data/reports/GO-2025-3706.yaml
new file mode 100644
index 0000000..86a0aa7
--- /dev/null
+++ b/data/reports/GO-2025-3706.yaml
@@ -0,0 +1,27 @@
+id: GO-2025-3706
+modules:
+ - module: github.com/gofiber/fiber
+ vulnerable_at: 1.14.6
+ - module: github.com/gofiber/fiber/v2
+ versions:
+ - introduced: 2.52.6
+ - fixed: 2.52.7
+ vulnerable_at: 2.52.6
+ packages:
+ - package: github.com/gofiber/fiber/v2/internal/schema
+ symbols:
+ - Decoder.Decode
+summary: |-
+ Fiber panics when fiber.Ctx.BodyParser parses invalid range index in
+ github.com/gofiber/fiber
+cves:
+ - CVE-2025-48075
+ghsas:
+ - GHSA-hg3g-gphw-5hhm
+references:
+ - advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-hg3g-gphw-5hhm
+ - fix: https://github.com/gofiber/fiber/commit/e115c08b8f059a4a031b492aa9eef0712411853d
+source:
+ id: GHSA-hg3g-gphw-5hhm
+ created: 2025-05-23T11:19:46.453453-04:00
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3707.yaml b/data/reports/GO-2025-3707.yaml
new file mode 100644
index 0000000..9a7745c
--- /dev/null
+++ b/data/reports/GO-2025-3707.yaml
@@ -0,0 +1,18 @@
+id: GO-2025-3707
+modules:
+ - module: github.com/openfga/openfga
+ versions:
+ - introduced: 1.8.0
+ - fixed: 1.8.13
+ vulnerable_at: 1.8.12
+summary: OpenFGA Authorization Bypass in github.com/openfga/openfga
+cves:
+ - CVE-2025-48371
+references:
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48371
+ - fix: https://github.com/openfga/openfga/commit/e5960d4eba92b723de8ff3a5346a07f50c1379ca
+ - web: https://github.com/openfga/openfga/security/advisories/GHSA-c72g-53hw-82q7
+source:
+ id: CVE-2025-48371
+ created: 2025-05-23T11:19:40.662898-04:00
+review_status: UNREVIEWED