{"id":"CVE-2025-46721","summary":"nosurf vulnerable to CSRF due to non-functional same-origin request checks","details":"nosurf is cross-site request forgery (CSRF) protection middleware for Go. A vulnerability in versions prior to 1.2.0 allows an attacker who controls content on the target site, or on a subdomain of the target site (either via XSS, or otherwise) to bypass CSRF checks and issue requests on user's behalf. Due to misuse of the Go `net/http` library, nosurf categorizes all incoming requests as plain-text HTTP requests, in which case the `Referer` header is not checked to have the same origin as the target webpage. If the attacker has control over HTML contents on either the target website (e.g. `example.com`), or on a website hosted on a subdomain of the target (e.g. `attacker.example.com`), they will also be able to manipulate cookies set for the target website. By acquiring the secret CSRF token from the cookie, or overriding the cookie with a new token known to the attacker, `attacker.example.com` is able to craft cross-site requests to `example.com`. A patch for the issue was released in nosurf 1.2.0. In lieu of upgrading to a patched version of nosurf, users may additionally use another HTTP middleware to ensure that a non-safe HTTP request is coming from the same origin (e.g. by requiring a `Sec-Fetch-Site: same-origin` header in the request).","aliases":["GHSA-w9hf-35q4-vcjw","GO-2025-3683"],"modified":"2026-04-02T12:48:40.949105Z","published":"2025-05-13T15:29:30.068Z","related":["GHSA-rq77-p4h8-4crw","GHSA-w9hf-35q4-vcjw","openSUSE-SU-2025:15135-1"],"database_specific":{"cwe_ids":["CWE-352"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/46xxx/CVE-2025-46721.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/justinas/nosurf/releases/tag/v1.2.0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/46xxx/CVE-2025-46721.json"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-rq77-p4h8-4crw"},{"type":"ADVISORY","url":"https://github.com/justinas/nosurf/security/advisories/GHSA-w9hf-35q4-vcjw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-46721"},{"type":"FIX","url":"https://github.com/justinas/nosurf/commit/ec9bb776d8e5ba9e906b6eb70428f4e7b009feee"},{"type":"PACKAGE","url":"https://github.com/justinas/nosurf-cve-2025-46721"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/justinas/nosurf","events":[{"introduced":"0"},{"fixed":"ec9bb776d8e5ba9e906b6eb70428f4e7b009feee"}]}],"versions":["v1.0.0","v1.1.0","v1.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-46721.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"}]}