-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The commit diff shows path sanitization was added via 'r.URL.Path = path.Clean(r.URL.Path)' in HTTPEngine.Handle. This indicates the function previously lacked proper input sanitization. The CVE description explicitly mentions HTTPEngine.Handle as the entry point, and the Go vulnerability database (GO-2020-0033) lists HTTPEngine.Handle as an affected symbol. The vulnerability manifests when processing user-controlled URL paths without normalization, making this function the clear vulnerable entry point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/go-aah/aah | go | < 0.12.4 | 0.12.4 |
| aahframe.work | go | < 0.12.4 | 0.12.4 |
KEV Misses 88% of Exploited CVEs- Get the report