CVE-2025-8689
WordPress vulnerability analysis and mitigation

Overview

CVE-2025-8689 is a security vulnerability affecting the golang packages in Red Hat Enterprise Linux 9.4. The vulnerability was discovered and disclosed on June 9, 2025, impacting the net/http component of the Go programming language compiler (Red Hat Advisory).

Technical details

The vulnerability is related to request smuggling due to the acceptance of invalid chunked data in net/http. Red Hat has rated this update as having a security impact of Moderate (Red Hat Advisory).

Impact

The vulnerability affects multiple Red Hat Enterprise Linux platforms including x86_64, IBM z Systems, Power LE, and ARM 64 architectures running version 9.4 with Extended Update Support and Update Services for SAP Solutions (Red Hat Advisory).

Mitigation and workarounds

Red Hat has released updated golang packages (version 1.21.13-9.el9_4) to address this vulnerability. Users are advised to apply these updates to their affected systems (Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-10176HIGH7.2
  • hackrepair-plugin-archiver
NoYesSep 12, 2025
CVE-2025-8575HIGH7.2
  • lws-cleaner
NoYesSep 12, 2025
CVE-2025-9881MEDIUM6.1
  • ultimate-blogroll
NoNoSep 12, 2025
CVE-2025-8280MEDIUM5.8
  • contact-form-7-recaptcha
NoNoSep 12, 2025
CVE-2025-3650LOW3.5
  • jquery-colorbox
NoNoSep 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management