nosurf is cross-site request forgery (CSRF) protection middleware for Go. A vulnerability in versions prior to 1.2.0 allows an attacker who controls content on the target site, or on a subdomain of the target site (either via XSS, or otherwise) to bypass CSRF checks and issue requests on user's behalf. Due to misuse of the Go `net/http` library, nosurf categorizes all incoming requests as plain-text HTTP requests, in which case the `Referer` header is not checked to have the same origin as the target webpage. If the attacker has control over HTML contents on either the target website (e.g. `example.com`), or on a website hosted on a subdomain of the target (e.g. `attacker.example.com`), they will also be able to manipulate cookies set for the target website. By acquiring the secret CSRF token from the cookie, or overriding the cookie with a new token known to the attacker, `attacker.example.com` is able to craft cross-site requests to `example.com`. A patch for the issue was released in nosurf 1.2.0. In lieu of upgrading to a patched version of nosurf, users may additionally use another HTTP middleware to ensure that a non-safe HTTP request is coming from the same origin (e.g. by requiring a `Sec-Fetch-Site: same-origin` header in the request).
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-rq77-p4h8-4crw | Not Applicable |
https://github.com/justinas/nosurf-cve-2025-46721 | Exploit Third Party Advisory |
https://github.com/justinas/nosurf/commit/ec9bb776d8e5ba9e906b6eb70428f4e7b009feee | Patch |
https://github.com/justinas/nosurf/releases/tag/v1.2.0 | Release Notes |
https://github.com/justinas/nosurf/security/advisories/GHSA-w9hf-35q4-vcjw | Vendor Advisory |
https://github.com/advisories/GHSA-rq77-p4h8-4crw | Not Applicable |
Configurations
History
23 Jun 2025, 14:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/advisories/GHSA-rq77-p4h8-4crw - Not Applicable | |
References | () https://github.com/justinas/nosurf-cve-2025-46721 - Exploit, Third Party Advisory | |
References | () https://github.com/justinas/nosurf/commit/ec9bb776d8e5ba9e906b6eb70428f4e7b009feee - Patch | |
References | () https://github.com/justinas/nosurf/releases/tag/v1.2.0 - Release Notes | |
References | () https://github.com/justinas/nosurf/security/advisories/GHSA-w9hf-35q4-vcjw - Vendor Advisory | |
CPE | cpe:2.3:a:nosurf_project:nosurf:*:*:*:*:*:go:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
Summary |
|
|
First Time |
Nosurf Project
Nosurf Project nosurf |
13 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/advisories/GHSA-rq77-p4h8-4crw - |
13 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-13 16:15
Updated : 2025-06-23 14:55
NVD link : CVE-2025-46721
Mitre link : CVE-2025-46721
CVE.ORG link : CVE-2025-46721
JSON object : View
Products Affected
nosurf_project
- nosurf
CWE
CWE-352
Cross-Site Request Forgery (CSRF)