NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-42503
Summary

gopls by default communicates via pipe. However, -port and -listen flags are supported as means of debugging.
If -listen is given a value without an explicit host (e.g. :8080), or -port is used, gopls will listen on 0.0.0.0. 
As a result, users might inadvertently cause gopls to bind 0.0.0.0.
This can allow a malicious party on the same network to execute code arbitrarily via gopls.

Publication Date May 7, 2026, 2:16 a.m.
Registration Date May 7, 2026, 4:09 a.m.
Last Update May 7, 2026, 2:16 a.m.
CVSS3.1 : HIGH
スコア 8.8
Vector CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Related information, measures and tools
Common Vulnerabilities List