Fix Resty — CVE-2023-44487 MEDIUM
Fix CVE-2023-44487 (MEDIUM) in Resty for Go. Paste your go.mod into PackageFix and get a patched version — no CLI, no signup. Credential exposure via debug logging of http headers.
⚠ Vulnerability
CVE-2023-44487 (MEDIUM) — credential exposure via debug logging of HTTP headers in Resty below v2.13.1.
Vulnerable — go.mod
github.com/go-resty/resty/v2 v2.7.0
Fixed — go.mod
github.com/go-resty/resty/v2 v2.13.1
✓ Fix
Update Resty to v2.13.1 and run go mod tidy.
Paste your manifest — get back a fixed version with all CVEs patched in seconds.
Open PackageFix →No signup · No CLI · No GitHub connection · Runs 100% in your browser
CVE Details
| Field | Value |
|---|---|
| CVE ID | CVE-2023-44487 |
| Severity | MEDIUM |
| Package | Resty (Go) |
| Safe version | v2.13.1 |
| CISA KEV | — |
| Description | Credential exposure via debug logging of http headers |
Frequently Asked Questions
What is CVE-2023-44487?
CVE-2023-44487 is a MEDIUM severity vulnerability in Resty (Go) that allows credential exposure via debug logging of HTTP headers. Update to v2.13.1 or later.
How do I fix CVE-2023-44487 in Resty?
Update Resty to version v2.13.1 in your go.mod and run go mod tidy.
Is CVE-2023-44487 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2023-44487?
After updating, paste your go.mod into PackageFix again. If CVE-2023-44487 no longer appears in the CVE table, the fix is applied.