fix(deps): update module github.com/gofiber/fiber/v2 to v2.52.12 [security]#63
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
fix(deps): update module github.com/gofiber/fiber/v2 to v2.52.12 [security]#63renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.52.11→v2.52.12GitHub Vulnerability Alerts
CVE-2026-25882
A denial of service vulnerability exists in Fiber v2 and v3 that allows remote attackers to crash the application by sending requests to routes with more than 30 parameters. The vulnerability results from missing validation during route registration combined with an unbounded array write during request matching.
Affected Versions
Vulnerability Details
Root Cause
Both Fiber v2 and v3 define a fixed-size parameter array in
ctx.go:The
router.goregister()function accepts routes without validating parameter count. When a request matches a route exceeding 30 parameters, the code inpath.goperforms an unbounded write:path.go:514path.go:516When
paramsIterator >= 30, this triggers:Attack Scenario
Application registers route with >30 parameters (e.g., via code or dynamic routing):
Attacker sends matching HTTP request:
Server crashes during request processing with runtime panic
Proof of Concept
For Fiber v3
Output:
For Fiber v2
Output (v2):
Impact
Exploitation Requirements
Real-World Impact
Likelihood
HIGH - Exploitation requires only:
Workarounds
Until patched, users should:
Audit Routes: Ensure all routes have ≤30 parameters
Disable Dynamic Routing: If programmatically registering routes, validate parameter count:
Rate Limiting: Deploy aggressive rate limiting to mitigate DoS impact
Monitoring: Alert on panic patterns in application logs
Timeline
References
Credit
Discovered by: @sixcolors (Fiber maintainer) and @TheAspectDev
Release Notes
gofiber/fiber (github.com/gofiber/fiber/v2)
v2.52.12Compare Source
🐛 Fixes
Full Changelog: gofiber/fiber@v2.52.11...v2.52.12
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.