Cyber Posture

CVE-2025-61732

High

Published: 05 February 2026

Published
05 February 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0001 0.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-61732 is a high-severity Code Injection (CWE-94) vulnerability in Golang Go. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and correction of the code injection flaw in the Go cgo compiler, preventing exploitation through timely patching.

preventdetect

Mandates vulnerability scanning of development environments to identify vulnerable Go versions affected by this cgo comment parsing discrepancy.

prevent

Enforces standardized secure development processes and tools, ensuring use of vetted and patched Go compilers to avoid build-time code smuggling.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

CVE enables code injection via malicious Go source compilation (T1204.002) leading to execution of attacker-controlled code in resulting binary (T1203).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.

Deeper analysisAI

CVE-2025-61732 is a code injection vulnerability (CWE-94) in the Go programming language's cgo feature, which enables calling C/C++ code from Go. The issue arises from a discrepancy in how comments are parsed between Go and C/C++, allowing malicious code to be smuggled into the resulting cgo binary during compilation. It carries a CVSS v3.1 base score of 8.6 (AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) and was published on 2026-02-05.

A local attacker requires no privileges but needs to trick a user into compiling Go code that uses cgo with specially crafted C/C++ comments containing smuggled code. User interaction is necessary for the compilation step, after which the resulting binary executes the injected code, achieving high impacts on confidentiality, integrity, and availability due to the changed scope.

Mitigation details are available in official Go advisories and patches, including the fix in change list https://go.dev/cl/734220, issue discussion at https://go.dev/issue/76697, announcement at https://groups.google.com/g/golang-announce/c/K09ubi9FQFk, and vulnerability entry at https://pkg.go.dev/vuln/GO-2026-4433.

Details

CWE(s)

Affected Products

golang
go
≤ 1.24.13 · 1.25.0 — 1.25.7

CVEs Like This One

CVE-2025-61731Same product: Golang Go
CVE-2026-27140Same product: Golang Go
CVE-2026-27143Same product: Golang Go
CVE-2026-32283Same product: Golang Go
CVE-2026-27137Same product: Golang Go
CVE-2026-32280Same product: Golang Go
CVE-2026-32281Same product: Golang Go
CVE-2026-33810Same product: Golang Go
CVE-2025-68121Same product: Golang Go
CVE-2025-61726Same product: Golang Go

References