Fiber is an Express inspired web framework written in Go. A denial of service vulnerability exists in Fiber v2 and v3 that allows remote attackers to crash the application by sending requests to routes with more than 30 parameters. The vulnerability results from missing validation during route registration combined with an unbounded array write during request matching. Version 2.52.12 patches the issue in the v2 branch and 3.1.0 patches the issue in the v3 branch.
References
| Link | Resource |
|---|---|
| https://github.com/gofiber/fiber/blob/main/path.go#L514 | Product |
| https://github.com/gofiber/fiber/blob/v2/path.go#L516 | Product |
| https://github.com/gofiber/fiber/pull/3962 | Issue Tracking Patch |
| https://github.com/gofiber/fiber/security/advisories/GHSA-mrq8-rjmw-wpq3 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-24 21:16
Updated : 2026-02-27 03:18
NVD link : CVE-2026-25882
Mitre link : CVE-2026-25882
CVE.ORG link : CVE-2026-25882
JSON object : View
Products Affected
gofiber
- fiber
CWE
CWE-129
Improper Validation of Array Index
