{"id":86809,"date":"2026-03-30T00:56:33","date_gmt":"2026-03-30T00:56:33","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T06:00:00","slug":"cve-2025-8959-unauthorized-read-access-vulnerability-in-hashicorp-s-go-getter-library","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-8959-unauthorized-read-access-vulnerability-in-hashicorp-s-go-getter-library\/","title":{"rendered":"<strong>CVE-2025-8959: Unauthorized Read Access Vulnerability in HashiCorp&#8217;s go-getter Library<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>HashiCorp&#8217;s go-getter library, widely used for file downloading, has been found to be vulnerable to symlink attacks, potentially resulting in unauthorized read access beyond the designated directory boundaries. This vulnerability, designated as CVE-2025-8959, possesses a significant threat to system security and data integrity as it can lead to system compromise or data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-8959<br \/>\nSeverity: High (7.5 CVSS Score)<br \/>\nAttack Vector: Symlink Attack<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Unauthorized read access beyond the designated boundaries, leading to potential system compromise or data leakage.<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-758827332\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>HashiCorp go-getter | < 1.7.9\n\n<strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability is exploited through a symlink attack, where a malicious actor creates a symbolic link to a file outside the designated directory. This allows the attacker to bypass the directory restrictions, gaining read access to files that should be inaccessible. Any product or system using a vulnerable version of the go-getter library could be at risk, potentially exposing sensitive information or system files.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p>\n<p>A conceptual example of the exploit in a shell command could be as follows:<\/p><div id=\"ameeb-4037037498\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<pre><code class=\"\" data-line=\"\"># Attacker creates a symlink to a file outside the designated directory\nln -s \/etc\/passwd .\/symlink\n# Attacker uses go-getter to download the symlink, resulting in unauthorized access to \/etc\/passwd\ngo-getter .\/symlink \/path\/to\/download<\/code><\/pre>\n<p><strong>Mitigation<\/strong><\/p>\n<p>Users are advised to upgrade to go-getter version 1.7.9 or later, which contains a patch for this vulnerability. If an upgrade is not immediately possible, a potential temporary mitigation could involve the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to monitor and block suspicious activity. However, these should not be considered long-term solutions, and an upgrade to a patched version of the software should be undertaken as soon as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview HashiCorp&#8217;s go-getter library, widely used for file downloading, has been found to be vulnerable to symlink attacks, potentially resulting in unauthorized read access beyond the designated directory boundaries. This vulnerability, designated as CVE-2025-8959, possesses a significant threat to system security and data integrity as it can lead to system compromise or data leakage. Vulnerability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-86809","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=86809"}],"version-history":[{"count":0,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86809\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=86809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=86809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=86809"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=86809"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=86809"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=86809"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=86809"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=86809"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=86809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}