CVE-2025-68274

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:emiago:sipgo:*:*:*:*:*:go:*:*

History

05 Mar 2026, 19:52

Type Values Removed Values Added
First Time Emiago
Emiago sipgo
References () https://github.com/emiago/sipgo/commit/dc9669364a154ec6d134e542f6a63c31b5afe6e8 - () https://github.com/emiago/sipgo/commit/dc9669364a154ec6d134e542f6a63c31b5afe6e8 - Patch
References () https://github.com/emiago/sipgo/security/advisories/GHSA-c623-f998-8hhv - () https://github.com/emiago/sipgo/security/advisories/GHSA-c623-f998-8hhv - Vendor Advisory, Exploit
CPE cpe:2.3:a:emiago:sipgo:*:*:*:*:*:go:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

16 Dec 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-16 22:15

Updated : 2026-03-05 19:52


NVD link : CVE-2025-68274

Mitre link : CVE-2025-68274

CVE.ORG link : CVE-2025-68274


JSON object : View

Products Affected

emiago

  • sipgo
CWE
CWE-476

NULL Pointer Dereference

CWE-755

Improper Handling of Exceptional Conditions