CVE-2026-4660
HashiCorp · go-getter
HashiCorp’s go-getter library contains a vulnerability, potentially related to improper handling of remote resources, that could lead to security risks in dependent applications.
Executive summary
A high-severity vulnerability in HashiCorp's go-getter library requires immediate attention as it impacts multiple downstream products relying on this library for resource retrieval.
Vulnerability
The vulnerability exists within the go-getter library, which is commonly used to download remote files or directories. While specific details are limited, such flaws typically involve insecure handling of URLs or data during the retrieval process.
Business impact
Because go-getter is a foundational library used by various infrastructure-as-code and orchestration tools, this vulnerability could lead to remote code execution or unauthorized file access in dependent applications. The CVSS score of 7.5 highlights the potential for severe security degradation across affected enterprise environments.
Remediation
Immediate Action: Identify all internal applications and services that utilize the HashiCorp go-getter library and update them to the version specified in the vendor advisory.
Proactive Monitoring: Monitor for unexpected outbound network connections or file system modifications initiated by applications utilizing go-getter.
Compensating Controls: Implement egress filtering to prevent applications from fetching resources from untrusted or unknown external origins.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the central role of go-getter in HashiCorp and third-party tools, organizations should perform an immediate inventory of their software stack to identify affected dependencies. Prioritize patching to prevent potential remote exploitation of infrastructure management workflows.