Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/gofiber/fiber/releases/tag/v3.1.0 | Release Notes |
| https://github.com/gofiber/fiber/security/advisories/GHSA-2mr3-m5q5-wgp6 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-24 22:16
Updated : 2026-02-25 20:31
NVD link : CVE-2026-25899
Mitre link : CVE-2026-25899
CVE.ORG link : CVE-2026-25899
JSON object : View
Products Affected
gofiber
- fiber
