{"id":"GO-2024-2883","summary":"Denial of service via malicious preflight requests in github.com/rs/cors","details":"Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.","aliases":["CVE-2025-47908","GHSA-mh55-gqvf-xfwm"],"modified":"2026-02-04T04:22:36.439584Z","published":"2024-07-02T19:20:36Z","related":["CGA-gcmv-pxrj-3x4w"],"database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2024-2883"},"references":[{"type":"FIX","url":"https://github.com/rs/cors/pull/171"},{"type":"REPORT","url":"https://github.com/rs/cors/issues/170"}],"affected":[{"package":{"name":"github.com/rs/cors","ecosystem":"Go","purl":"pkg:golang/github.com/rs/cors"},"ranges":[{"type":"SEMVER","events":[{"introduced":"1.9.0"},{"fixed":"1.11.0"}]}],"ecosystem_specific":{"imports":[{"symbols":["AllowAll","Cors.HandlerFunc","Cors.ServeHTTP","Cors.areHeadersAllowed","Cors.handlePreflight","Default","New","splitHeaderValues"],"path":"github.com/rs/cors"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2024-2883.json"}}],"schema_version":"1.7.3","credits":[{"name":"@jub0bs"}]}