Home

Description

Fiber is an Express inspired web framework written in Go. A denial of service vulnerability exists in Fiber v2 and v3 that allows remote attackers to crash the application by sending requests to routes with more than 30 parameters. The vulnerability results from missing validation during route registration combined with an unbounded array write during request matching. Version 2.52.12 patches the issue in the v2 branch and 3.1.0 patches the issue in the v3 branch.

PUBLISHED Reserved 2026-02-06 | Published 2026-02-24 | Updated 2026-02-24 | Assigner GitHub_M




MEDIUM: 5.5CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P

Problem types

CWE-129: Improper Validation of Array Index

Product status

>= 2.0.0, < 2.52.12
affected

>= 3.0.0, < 3.1.0
affected

References

github.com/.../fiber/security/advisories/GHSA-mrq8-rjmw-wpq3

github.com/gofiber/fiber/pull/3962

github.com/gofiber/fiber/blob/main/path.go

github.com/gofiber/fiber/blob/v2/path.go

cve.org (CVE-2026-25882)

nvd.nist.gov (CVE-2026-25882)

Download JSON