Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25049 | HashiCorp go-getter Vulnerable to Symlink Attacks |
Github GHSA |
GHSA-wjrx-6529-hcj3 | HashiCorp go-getter Vulnerable to Symlink Attacks |
Thu, 11 Dec 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hashicorp:go-getter:*:*:*:*:*:*:*:* |
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashicorp
Hashicorp go-getter |
|
| Vendors & Products |
Hashicorp
Hashicorp go-getter |
Sat, 16 Aug 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 15 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 Aug 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HashiCorp's go-getter library subdirectory download feature is vulnerable to symlink attacks leading to unauthorized read access beyond the designated directory boundaries. This vulnerability, identified as CVE-2025-8959, is fixed in go-getter 1.7.9. | |
| Title | HashiCorp go-getter Vulnerable to Arbitrary Read through Symlink Attack | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2025-08-15T20:46:06.131Z
Reserved: 2025-08-13T15:17:26.971Z
Link: CVE-2025-8959
Updated: 2025-08-15T20:45:58.857Z
Status : Analyzed
Published: 2025-08-15T21:15:37.347
Modified: 2025-12-11T19:56:22.320
Link: CVE-2025-8959
OpenCVE Enrichment
Updated: 2025-08-16T21:40:39Z
EUVD
Github GHSA