CVE-2026-25882

medium

Description

Fiber is an Express inspired web framework written in Go. A denial of service vulnerability exists in Fiber v2 and v3 that allows remote attackers to crash the application by sending requests to routes with more than 30 parameters. The vulnerability results from missing validation during route registration combined with an unbounded array write during request matching. Version 2.52.12 patches the issue in the v2 branch and 3.1.0 patches the issue in the v3 branch.

References

https://github.com/gofiber/fiber/security/advisories/GHSA-mrq8-rjmw-wpq3

https://github.com/gofiber/fiber/pull/3962

https://github.com/gofiber/fiber/blob/v2/path.go#L516

https://github.com/gofiber/fiber/blob/main/path.go#L514

Details

Source: Mitre, NVD

Published: 2026-02-24

Updated: 2026-02-24

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High

CVSS v4

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Severity: Medium