Skip to content

Comments

chore(deps): update module github.com/rs/cors to v1.11.0 [security]#396

Open
renovate-sh-app[bot] wants to merge 1 commit intomainfrom
renovate/go-github.com-rs-cors-vulnerability
Open

chore(deps): update module github.com/rs/cors to v1.11.0 [security]#396
renovate-sh-app[bot] wants to merge 1 commit intomainfrom
renovate/go-github.com-rs-cors-vulnerability

Conversation

@renovate-sh-app
Copy link
Contributor

@renovate-sh-app renovate-sh-app bot commented Oct 3, 2025

This PR contains the following updates:

Package Change Age Confidence
github.com/rs/cors v1.10.1v1.11.0 age confidence

GitHub Vulnerability Alerts

CVE-2025-47908

Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.


Denial of service via malicious preflight requests in github.com/rs/cors

CVE-2025-47908 / GHSA-mh55-gqvf-xfwm / GO-2024-2883

More information

Details

Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Denial of service via malicious preflight requests in github.com/rs/cors

CVE-2025-47908 / GHSA-mh55-gqvf-xfwm / GO-2024-2883

More information

Details

Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.

Severity

Moderate

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

rs/cors (github.com/rs/cors)

v1.11.0

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

Need help?

You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.


Note

Low Risk
Dependency-only bump of github.com/rs/cors with no code changes; behavior impact is limited to CORS middleware internals, though it targets a DoS-related security fix.

Overview
Updates the indirect Go dependency github.com/rs/cors from v1.10.1 to v1.11.0 in go.mod/go.sum (security-related release).

No application code changes; only module metadata and checksums are updated.

Written by Cursor Bugbot for commit d0088a0. This will update automatically on new commits. Configure here.

@renovate-sh-app renovate-sh-app bot requested a review from a team as a code owner October 3, 2025 15:02
@renovate-sh-app renovate-sh-app bot enabled auto-merge (squash) October 3, 2025 15:02
@github-project-automation github-project-automation bot moved this to In review in Alerting Oct 3, 2025
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 3 times, most recently from fc89910 to 2093022 Compare October 9, 2025 21:02
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 5 times, most recently from 596333a to 20e14d3 Compare October 30, 2025 18:15
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 3 times, most recently from 52c78f2 to b91c0d1 Compare November 10, 2025 21:15
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch from b91c0d1 to 9398ebd Compare November 19, 2025 21:26
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 5 times, most recently from ad28d97 to 791ce25 Compare December 4, 2025 15:09
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 5 times, most recently from 98af1cd to 974ae3c Compare December 17, 2025 12:06
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 2 times, most recently from be259bd to 3f369e6 Compare December 23, 2025 18:05
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 4 times, most recently from 3b813b3 to 5a60baf Compare January 2, 2026 15:09
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 6 times, most recently from 4db6c0b to c4c49c9 Compare January 17, 2026 00:05
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 4 times, most recently from 243c27b to ee192d6 Compare January 26, 2026 09:06
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 3 times, most recently from a93ec03 to 4155033 Compare February 3, 2026 18:09
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 3 times, most recently from 9e59e04 to 3f4d143 Compare February 12, 2026 22:03
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 3 times, most recently from ebf8500 to a3bc07a Compare February 23, 2026 15:05
Copy link

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Bugbot Autofix is ON. A Cloud Agent has been kicked off to fix the reported issue.

github.com/prometheus/exporter-toolkit v0.11.0 // indirect
github.com/prometheus/procfs v0.16.1 // indirect
github.com/rs/cors v1.10.1 // indirect
github.com/rs/cors v1.11.0 // indirect
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CORS wildcard credentials behavior may change

Medium Severity

Updating github.com/rs/cors to v1.11.0 can change runtime CORS behavior, notably for configurations combining AllowedOrigins: ["*"] with AllowCredentials: true. If the service relied on the prior “reflect any Origin” behavior, cross-origin requests may start failing because the expected Access-Control-Allow-Origin header is no longer emitted.

Additional Locations (1)

Fix in Cursor Fix in Web

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bugbot Autofix determined this is a false positive.

The alertmanager uses cors.Default() which sets AllowCredentials to false, so the v1.11.0 behavior change for wildcard origins with credentials enabled does not apply to this codebase.

@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch 2 times, most recently from a0b2f2d to 32dc8a1 Compare February 24, 2026 00:05
| datasource | package            | from    | to      |
| ---------- | ------------------ | ------- | ------- |
| go         | github.com/rs/cors | v1.10.1 | v1.11.0 |


Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-rs-cors-vulnerability branch from 32dc8a1 to d0088a0 Compare February 24, 2026 12:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: In review

Development

Successfully merging this pull request may close these issues.

0 participants