Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Golang
Golang go |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Golang
Golang go |
Thu, 05 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gotoolchain
Gotoolchain cmd/go |
|
| Vendors & Products |
Gotoolchain
Gotoolchain cmd/go |
Wed, 28 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location. | |
| Title | Arbitrary file write using cgo pkg-config directive in cmd/go | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-02-26T15:04:45.375Z
Reserved: 2025-09-30T15:05:03.605Z
Link: CVE-2025-61731
Updated: 2026-01-29T16:17:20.484Z
Status : Analyzed
Published: 2026-01-28T20:16:10.073
Modified: 2026-02-06T18:43:14.143
Link: CVE-2025-61731
OpenCVE Enrichment
Updated: 2026-01-29T09:08:43Z