/
DirectorySecurity AdvisoriesPricing
Sign in
Security Advisories

CGA-3qjj-m9qm-rqpp

Published

Last updated

https://images.chainguard.dev/security/CGA-3qjj-m9qm-rqpp
Package

influxd-2.7

Repository

Chainguard

Latest Update
Not affected
Aliases
  • CVE-2025-30204
  • GHSA-mh63-6h87-95cp

Severity

7.5

High

CVSS V3

References

  • https://nvd.nist.gov/vuln/detail/CVE-2025-30204

Updates

Status

Not affected

Justification

Vulnerable code not in execute path

Impact

CVE-2025-30204 impacts applications that use the parse.ParseUnverified function. This function is designed to extract values from tokens without validating their signatures. However, InfluxDB is not affected by this vulnerability as it does not utilize the parse.ParseUnverified function.

Status

Affected

Impact

Govulncheck found vulnerable symbols in Go binaries at the following locations: in influxd-2.7-2.7.11-r44.apk, at usr/bin/influxd, usr/bin/influxd.

Status

Under investigation

Status

Pending upstream fix

Impact

The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in via the project's main go.mod. Due to functional changes required to move away from v3 to v4/v5, upstream maintainers are required to implement.


Safe Source for Open Source™
Contact us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing