UNCLASSIFIED - NO CUI

chore(findings): softwarfare/swis-pangae-job-engine

Summary

softwarfare/swis-pangae-job-engine has 124 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=softwarfare/swis-pangae-job-engine&tag=0.23.0&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2025-29923 Twistlock CVE Low github.com/redis/go-redis/v9-v9.6.1 0.00158 false
CVE-2026-33816 Twistlock CVE Critical github.com/jackc/pgx/v5/pgproto3-v5.7.6 0.00061 false
CVE-2026-33815 Twistlock CVE Critical github.com/jackc/pgx/v5/pgproto3-v5.7.6 0.00061 false
CVE-2026-39820 Anchore CVE High stdlib-go1.24.7 0.00054 false
CVE-2026-39820 Anchore CVE High stdlib-go1.24.7 0.00054 false
CVE-2025-69725 Twistlock CVE Medium github.com/go-chi/chi/v5/middleware-v5.2.3 0.00048 false
CVE-2026-25679 Twistlock CVE High net/url-1.24.7 0.00044 false
CVE-2026-25679 Anchore CVE High stdlib-go1.24.7 0.00044 false
CVE-2026-25679 Anchore CVE High stdlib-go1.24.7 0.00044 false
CVE-2025-61725 Anchore CVE High stdlib-go1.24.7 0.00040 false
CVE-2025-61725 Anchore CVE High stdlib-go1.24.7 0.00040 false
CVE-2025-61723 Twistlock CVE High encoding/pem-1.24.7 0.00039 false
CVE-2025-61723 Anchore CVE High stdlib-go1.24.7 0.00039 false
CVE-2025-61723 Anchore CVE High stdlib-go1.24.7 0.00039 false
CVE-2025-58186 Twistlock CVE Low net/http-1.24.7 0.00037 false
CVE-2025-58186 Anchore CVE Medium stdlib-go1.24.7 0.00037 false
CVE-2025-58186 Anchore CVE Medium stdlib-go1.24.7 0.00037 false
CVE-2025-61726 Twistlock CVE High net/url-1.24.7 0.00034 false
CVE-2025-61726 Anchore CVE High stdlib-go1.24.7 0.00034 false
CVE-2025-61726 Anchore CVE High stdlib-go1.24.7 0.00034 false
CVE-2025-58185 Anchore CVE Medium stdlib-go1.24.7 0.00031 false
CVE-2025-58185 Anchore CVE Medium stdlib-go1.24.7 0.00031 false
CVE-2025-58185 Twistlock CVE Medium encoding/asn1-1.24.7 0.00031 false
CVE-2026-42499 Anchore CVE High stdlib-go1.24.7 0.00022 false
CVE-2026-42499 Anchore CVE High stdlib-go1.24.7 0.00022 false
CVE-2025-47912 Twistlock CVE Medium net/url-1.24.7 0.00022 false
CVE-2025-47912 Anchore CVE Medium stdlib-go1.24.7 0.00022 false
CVE-2025-47912 Anchore CVE Medium stdlib-go1.24.7 0.00022 false
CVE-2025-61724 Twistlock CVE Medium net/textproto-1.24.7 0.00021 false
CVE-2025-61724 Anchore CVE Medium stdlib-go1.24.7 0.00021 false
CVE-2025-61724 Anchore CVE Medium stdlib-go1.24.7 0.00021 false
CVE-2026-39836 Twistlock CVE High net-1.24.7 0.00020 false
CVE-2026-39836 Anchore CVE High stdlib-go1.24.7 0.00020 false
CVE-2026-39836 Anchore CVE High stdlib-go1.24.7 0.00020 false
CVE-2026-33186 Twistlock CVE Critical google.golang.org/grpc-v1.75.1 0.00020 false
CVE-2026-32283 Twistlock CVE High crypto/tls-1.24.7 0.00019 false
CVE-2026-32283 Anchore CVE High stdlib-go1.24.7 0.00019 false
CVE-2026-32283 Anchore CVE High stdlib-go1.24.7 0.00019 false
CVE-2026-32281 Twistlock CVE High crypto/x509-1.24.7 0.00019 false
CVE-2026-32281 Anchore CVE High stdlib-go1.24.7 0.00019 false
CVE-2026-32281 Anchore CVE High stdlib-go1.24.7 0.00019 false
CVE-2026-32280 Twistlock CVE High crypto/x509-1.24.7 0.00019 false
CVE-2026-32280 Anchore CVE High stdlib-go1.24.7 0.00019 false
CVE-2026-32280 Anchore CVE High stdlib-go1.24.7 0.00019 false
CVE-2026-27143 Anchore CVE Critical stdlib-go1.24.7 0.00019 false
CVE-2026-27143 Anchore CVE Critical stdlib-go1.24.7 0.00019 false
CVE-2025-61728 Anchore CVE Medium stdlib-go1.24.7 0.00019 false
CVE-2025-61728 Anchore CVE Medium stdlib-go1.24.7 0.00019 false
CVE-2026-33814 Twistlock CVE High golang.org/x/net/http2-v0.44.0 0.00018 false
CVE-2026-33814 Twistlock CVE High net/http-1.24.7 0.00018 false
CVE-2026-33814 Anchore CVE High stdlib-go1.24.7 0.00018 false
CVE-2026-33814 Anchore CVE High stdlib-go1.24.7 0.00018 false
CVE-2025-68121 Twistlock CVE Critical crypto/tls-1.24.7 0.00018 false
CVE-2025-68121 Anchore CVE Critical stdlib-go1.24.7 0.00018 false
CVE-2025-68121 Anchore CVE Critical stdlib-go1.24.7 0.00018 false
CVE-2025-58187 Twistlock CVE High crypto/x509-1.24.7 0.00018 false
CVE-2025-58187 Anchore CVE High stdlib-go1.24.7 0.00018 false
CVE-2025-58187 Anchore CVE High stdlib-go1.24.7 0.00018 false
CVE-2026-33811 Twistlock CVE High net-1.24.7 0.00017 false
CVE-2026-33811 Anchore CVE High stdlib-go1.24.7 0.00017 false
CVE-2026-33811 Anchore CVE High stdlib-go1.24.7 0.00017 false
CVE-2025-61729 Twistlock CVE High crypto/x509-1.24.7 0.00017 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.7 0.00017 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.7 0.00017 false
CVE-2025-58183 Anchore CVE Medium stdlib-go1.24.7 0.00017 false
CVE-2025-58183 Anchore CVE Medium stdlib-go1.24.7 0.00017 false
CVE-2025-47911 Anchore CVE Medium golang.org/x/net-v0.44.0 0.00017 false
CVE-2025-58189 Twistlock CVE Medium crypto/tls-1.24.7 0.00016 false
CVE-2025-58189 Anchore CVE Medium stdlib-go1.24.7 0.00016 false
CVE-2025-58189 Anchore CVE Medium stdlib-go1.24.7 0.00016 false
CVE-2026-27140 Anchore CVE High stdlib-go1.24.7 0.00015 false
CVE-2026-27140 Anchore CVE High stdlib-go1.24.7 0.00015 false
CVE-2026-39817 Anchore CVE Medium stdlib-go1.24.7 0.00014 false
CVE-2026-39817 Anchore CVE Medium stdlib-go1.24.7 0.00014 false
CVE-2026-39826 Twistlock CVE Medium html/template-1.24.7 0.00013 false
CVE-2026-39826 Anchore CVE Medium stdlib-go1.24.7 0.00013 false
CVE-2026-39826 Anchore CVE Medium stdlib-go1.24.7 0.00013 false
CVE-2026-27142 Twistlock CVE Medium html/template-1.24.7 0.00013 false
CVE-2026-27142 Anchore CVE Medium stdlib-go1.24.7 0.00013 false
CVE-2026-27142 Anchore CVE Medium stdlib-go1.24.7 0.00013 false
CVE-2026-39825 Twistlock CVE Medium net/http/httputil-1.24.7 0.00012 false
CVE-2026-39825 Anchore CVE Medium stdlib-go1.24.7 0.00012 false
CVE-2026-39825 Anchore CVE Medium stdlib-go1.24.7 0.00012 false
CVE-2026-32289 Twistlock CVE Medium html/template-1.24.7 0.00011 false
CVE-2026-32289 Anchore CVE Medium stdlib-go1.24.7 0.00011 false
CVE-2026-32289 Anchore CVE Medium stdlib-go1.24.7 0.00011 false
CVE-2025-58190 Anchore CVE Medium golang.org/x/net-v0.44.0 0.00011 false
CVE-2026-41889 Twistlock CVE Low github.com/jackc/pgx/v5-v5.7.6 0.00010 false
CVE-2026-39823 Twistlock CVE Medium html/template-1.24.7 0.00010 false
CVE-2026-39823 Anchore CVE Medium stdlib-go1.24.7 0.00010 false
CVE-2026-39823 Anchore CVE Medium stdlib-go1.24.7 0.00010 false
CVE-2025-61731 Anchore CVE High stdlib-go1.24.7 0.00010 false
CVE-2025-61731 Anchore CVE High stdlib-go1.24.7 0.00010 false
CVE-2026-39819 Anchore CVE Medium stdlib-go1.24.7 0.00009 false
CVE-2026-39819 Anchore CVE Medium stdlib-go1.24.7 0.00009 false
CVE-2026-32282 Anchore CVE Medium stdlib-go1.24.7 0.00009 false
CVE-2026-32282 Anchore CVE Medium stdlib-go1.24.7 0.00009 false
CVE-2025-61730 Twistlock CVE Medium crypto/tls-1.24.7 0.00009 false
CVE-2025-61730 Anchore CVE Medium stdlib-go1.24.7 0.00009 false
CVE-2025-61730 Anchore CVE Medium stdlib-go1.24.7 0.00009 false
CVE-2025-58188 Twistlock CVE High crypto/x509-1.24.7 0.00009 false
CVE-2025-58188 Anchore CVE High stdlib-go1.24.7 0.00009 false
CVE-2025-58188 Anchore CVE High stdlib-go1.24.7 0.00009 false
CVE-2026-42501 Anchore CVE High stdlib-go1.24.7 0.00008 false
CVE-2026-42501 Anchore CVE High stdlib-go1.24.7 0.00008 false
CVE-2025-61727 Twistlock CVE Medium crypto/x509-1.24.7 0.00008 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.7 0.00008 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.7 0.00008 false
CVE-2026-27139 Twistlock CVE Low os-1.24.7 0.00007 false
CVE-2026-27139 Anchore CVE Low stdlib-go1.24.7 0.00007 false
CVE-2026-27139 Anchore CVE Low stdlib-go1.24.7 0.00007 false
CVE-2025-61732 Anchore CVE High stdlib-go1.24.7 0.00007 false
CVE-2025-61732 Anchore CVE High stdlib-go1.24.7 0.00007 false
CVE-2026-27144 Anchore CVE High stdlib-go1.24.7 0.00006 false
CVE-2026-27144 Anchore CVE High stdlib-go1.24.7 0.00006 false
CVE-2026-32288 Anchore CVE Medium stdlib-go1.24.7 0.00004 false
CVE-2026-32288 Anchore CVE Medium stdlib-go1.24.7 0.00004 false
GHSA-pjcq-xvwq-hhpj Anchore CVE Medium github.com/Azure/go-ntlmssp-v0.0.0-20221128193559-754e69321358 N/A N/A
GHSA-p77j-4mvh-x3m3 Anchore CVE Critical google.golang.org/grpc-v1.75.1 N/A N/A
GHSA-j88v-2chj-qfwx Anchore CVE Low github.com/jackc/pgx/v5-v5.7.6 N/A N/A
GHSA-j5w8-q4qc-rx2x Anchore CVE Medium golang.org/x/crypto-v0.42.0 N/A N/A
GHSA-f6x5-jh6r-wrfv Anchore CVE Medium golang.org/x/crypto-v0.42.0 N/A N/A
GHSA-9jj7-4m8r-rfcm Anchore CVE Critical github.com/jackc/pgx/v5-v5.7.6 N/A N/A
GHSA-92cp-5422-2mw7 Anchore CVE Low github.com/redis/go-redis/v9-v9.6.1 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=softwarfare/swis-pangae-job-engine&tag=0.23.0&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN