GO-2026-4982

Source
https://pkg.go.dev/vuln/GO-2026-4982
Import Source
https://vuln.go.dev/ID/GO-2026-4982.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2026-4982
Aliases
Related
Published
2026-05-07T19:21:40Z
Modified
2026-05-11T08:11:21.041304281Z
Summary
Bypass of meta content URL escaping causes XSS in html/template
Details

CVE-2026-27142 fixed a vulnerability in which URLs were not correctly escaped inside of a <meta> tag's <content> attribute. If the URL content were to insert ASCII whitespaces around the '=' rune inside of the <content> attribute, the escaper would fail to similarly escape it, leading to XSS.

Database specific
{
    "url": "https://pkg.go.dev/vuln/GO-2026-4982",
    "review_status": "REVIEWED"
}
References
Credits
    • Samy Ghannad

Affected packages

Go / stdlib

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.25.10
Introduced
1.26.0-0
Fixed
1.26.3

Ecosystem specific

{
    "imports": [
        {
            "symbols": [
                "Template.Execute",
                "Template.ExecuteTemplate",
                "tMetaContent"
            ],
            "path": "html/template"
        }
    ]
}

Database specific

source
"https://vuln.go.dev/ID/GO-2026-4982.json"