Golang HTTP/2 Vulnerability: Sending Specific Frames Can Crash Servers (CVE-2026-27141)
A critical vulnerability in the widely used `golang.org/x/net` library allows a simple HTTP/2 request to crash Go-based servers. The flaw, tracked as CVE-2026-27141 (GO-2026-4559), stems from a missing nil check in the HTTP/2 frame handling code. Specifically, sending frames with type codes between 0x0a and 0x0f will trigger a panic, causing the running server to terminate abruptly. This creates a straightforward denial-of-service (DoS) vector for any service built with the affected versions of the Go networking library.
The vulnerability is present in versions prior to v0.51.0. The issue was addressed in the latest release, v0.51.0, which is now being rolled out via dependency management tools like RenovateBot. The update is marked with a security label, underscoring its urgency. The severity of the flaw is currently listed as 'Unknown' in the official databases, but the potential for immediate service disruption makes it a high-priority patch for development and operations teams.
This vulnerability places immediate pressure on organizations running Go-based web services, APIs, and microservices. The ease of exploitation—sending a crafted HTTP/2 frame—means attackers can potentially take down critical infrastructure with minimal effort. The widespread adoption of Go in cloud-native and backend systems amplifies the risk. Teams must prioritize updating their dependencies to `golang.org/x/net v0.51.0` or later to mitigate this server-crashing threat and prevent potential outages.