Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/gofiber/fiber/releases/tag/v3.1.0 | Release Notes |
| https://github.com/gofiber/fiber/security/advisories/GHSA-2mr3-m5q5-wgp6 | Exploit Vendor Advisory |
Configurations
History
25 Feb 2026, 20:31
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:* | |
| First Time |
Gofiber
Gofiber fiber |
|
| CWE | CWE-770 | |
| References | () https://github.com/gofiber/fiber/releases/tag/v3.1.0 - Release Notes | |
| References | () https://github.com/gofiber/fiber/security/advisories/GHSA-2mr3-m5q5-wgp6 - Exploit, Vendor Advisory |
24 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 22:16
Updated : 2026-02-25 20:31
NVD link : CVE-2026-25899
Mitre link : CVE-2026-25899
CVE.ORG link : CVE-2026-25899
JSON object : View
Products Affected
gofiber
- fiber
