{"id":"AZL-75734","summary":"CVE-2025-61726 affecting package golang for versions less than 1.25.6-1","details":"The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.","modified":"2026-04-01T05:22:53.777647Z","published":"2026-01-28T20:16:09Z","upstream":["CVE-2025-61726"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61726"}],"affected":[{"package":{"name":"golang","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/golang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"1.26.0"},{"fixed":"1.25.6-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-75734.json"}}],"schema_version":"1.7.5"}