CVE-2025-8959
Trivy vulnerability analysis and mitigation

Overview

HashiCorp's go-getter library subdirectory download feature was found to contain a security vulnerability (CVE-2025-8959) that allows unauthorized read access beyond designated directory boundaries through symlink attacks. The vulnerability affects go-getter versions up to 1.7.8 and was fixed in version 1.7.9. This security issue was discovered and disclosed on August 15, 2025, by HashiCorp's Product Security team (HashiCorp Advisory).

Technical details

The vulnerability exists in the subdirectory download functionality of the go-getter library. When downloading specific subdirectories from a fetched source, the library improperly handles symbolic links present in the source repository during content extraction into the designated local subdirectory. This improper link resolution, classified as CWE-59 (Improper Link Resolution Before File Access), allows for unauthorized read access across the filesystem beyond the intended directory boundaries. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD Database).

Impact

The vulnerability enables attackers to gain unauthorized read access to files and directories outside the intended directory boundaries through symlink manipulation. This could potentially lead to exposure of sensitive information stored elsewhere in the filesystem that should not be accessible through the go-getter library (HashiCorp Advisory).

Mitigation and workarounds

Users of the go-getter library are advised to upgrade to version 1.7.9 or later to address this vulnerability. Organizations should evaluate the risk associated with their specific go-getter usage and implement the upgrade accordingly. The fixed version can be obtained from the official go-getter releases repository (HashiCorp Advisory).

Additional resources


SourceThis report was generated using AI

Related Trivy vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-8959HIGH7.5
  • TrivyTrivy
  • tflint
NoYesAug 15, 2025
CVE-2025-55199MEDIUM6.5
  • HelmHelm
  • k9s-fips
NoYesAug 14, 2025
CVE-2025-55198MEDIUM6.5
  • HelmHelm
  • istio-1.27
NoYesAug 14, 2025
CVE-2025-47910MEDIUM5.4
  • Terraform CommunityTerraform Community
  • terraform-1.10
NoYesSep 22, 2025
CVE-2025-58058MEDIUM5.3
  • Terraform CommunityTerraform Community
  • terraform
NoYesAug 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management