
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-fv92-fjc5-jj9h) affects the mapstructure library, discovered in June 2025. This security issue involves potential information leakage when processing malformed data in security-critical contexts. The vulnerability affects versions < 2.3.0 of github.com/go-viper/mapstructure/v2, with version 2.3.0 providing the patch (GitHub Advisory).
The vulnerability carries a CVSS score of 5.3 (Moderate severity) with the vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N. The issue occurs when mapstructure's WeakDecode function processes malformed data, particularly when handling type mismatches between expected and provided data types. The error messages generated during these mismatches can potentially expose sensitive information in logs (GitHub Advisory).
This vulnerability is primarily an information disclosure issue that could lead to the exposure of sensitive data in error logs. The impact is particularly significant when the library is used in security-critical applications like OpenBao or HashiCorp Vault. The CVSS metrics indicate high confidentiality impact, though integrity and availability remain unaffected (GitHub Advisory, Wiz Report).
The primary mitigation is to upgrade to mapstructure version 2.3.0 or later, which contains the fix for this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."