PT-2026-5930 · Go+2 · Go+2
Ryotak
·
Published
2026-02-03
·
Updated
2026-04-30
·
CVE-2025-61732
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Go (affected versions not specified)
Description
A difference in how Go and C/C++ interpret comments can allow malicious code to be hidden within the compiled binary when using cgo. This technique, known as code smuggling, enables attackers to inject code that may be executed unexpectedly. There is no information available regarding the number of potentially affected devices or any real-world incidents where this issue has been exploited.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Go
Red Os
Rocky Linux