CLEANSTART-2026-ER42900

See a problem?
Import Source
https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-ER42900.json
JSON Data
https://api.osv.dev/v1/vulns/CLEANSTART-2026-ER42900
Upstream
  • CVE-2025-58183
  • CVE-2025-61725
Published
2026-01-30T15:41:23.817747Z
Modified
2026-01-29T18:58:54Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ParseAddress function constructs domain-literal address components through repeated string concatenation
Details

Multiple security vulnerabilities affect the external-dns-fips package. The ParseAddress function constructs domain-literal address components through repeated string concatenation. See references for individual vulnerability details.

References

Affected packages

CleanStart / external-dns-fips

Package

Name
external-dns-fips

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20.0-r2

Database specific

source
"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-ER42900.json"