Description
go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0918 | go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue. |
Github GHSA |
GHSA-fgxv-gw55-r5fq | Authorization Bypass Through User-Controlled Key in go-zero |
References
History
Wed, 03 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Go-zero
Go-zero go-zero |
|
| CPEs | cpe:2.3:a:go-zero:go-zero:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Go-zero
Go-zero go-zero |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-05T20:09:47.572Z
Reserved: 2024-02-22T18:08:38.875Z
Link: CVE-2024-27302
Updated: 2024-08-02T00:27:59.895Z
Status : Analyzed
Published: 2024-03-06T19:15:08.330
Modified: 2025-12-03T21:26:13.653
Link: CVE-2024-27302
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA