Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66630: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in gofiber fiber

0
Critical
VulnerabilityCVE-2025-66630cvecve-2025-66630cwe-338
Published: Mon Feb 09 2026 (02/09/2026, 18:04:47 UTC)
Source: CVE Database V5
Vendor/Project: gofiber
Product: fiber

Description

CVE-2025-66630 is a critical vulnerability in the GoFiber web framework versions prior to 2. 52. 11, caused by the use of a cryptographically weak pseudo-random number generator (PRNG) in UUID generation. The issue arises because the underlying crypto/rand package in Go versions before 1. 24 can return errors when secure randomness is unavailable, but Fiber's UUID functions do not propagate these errors. This leads to predictable or low-entropy UUIDs being used in security-sensitive middleware components such as sessions, CSRF protection, rate limiting, and request ID generation. Exploitation could allow attackers to predict identifiers, potentially bypassing security controls or causing session fixation. The vulnerability has a CVSS 4. 0 score of 9. 2 (critical) and is fixed in Fiber version 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:40:27 UTC

Technical Analysis

CVE-2025-66630 is a vulnerability in the GoFiber web framework, specifically versions before 2.52.11, that stems from the use of a cryptographically weak pseudo-random number generator (PRNG) when generating UUIDs. Fiber relies on Go's crypto/rand package to produce secure random values for UUIDv4 generation, which are widely used in Fiber's middleware components such as session management, CSRF tokens, rate limiting, and request ID generation. However, in Go versions prior to 1.24, the crypto/rand implementation can fail to provide secure randomness and return an error. Fiber's UUID functions do not return or handle this error, causing the application to unknowingly use predictable or repeated UUIDs with low entropy. This undermines the security guarantees of middleware relying on these UUIDs, potentially allowing attackers to predict session identifiers, bypass CSRF protections, evade rate limits, or manipulate request tracking. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG). It has a CVSS 4.0 score of 9.2, indicating critical severity with network attack vector, high impact on confidentiality and integrity, and no required privileges or user interaction. The issue is fixed in Fiber version 2.52.11, which properly handles errors from crypto/rand and ensures secure UUID generation. No known exploits have been reported yet, but the widespread use of Fiber and its middleware in Go web applications makes this a significant threat vector.

Potential Impact

For European organizations, this vulnerability poses a critical risk to web applications built on the GoFiber framework using affected versions and running on Go versions prior to 1.24. The predictable UUIDs can lead to session hijacking, bypass of CSRF protections, manipulation of rate limiting, and request forgery, potentially resulting in unauthorized access, data leakage, and service disruption. Organizations in sectors with high security requirements such as finance, healthcare, government, and e-commerce are particularly at risk. The impact is exacerbated by the default use of vulnerable UUID generation in many Fiber middleware components, meaning even applications without explicit UUID usage may be affected. Exploitation could compromise user data confidentiality and integrity, damage trust, and lead to regulatory non-compliance under GDPR and other data protection laws. The critical CVSS score reflects the ease of remote exploitation without authentication or user interaction, increasing the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately upgrade all GoFiber dependencies to version 2.52.11 or later to ensure the vulnerability is patched. Additionally, they should verify that their Go runtime environment is version 1.24 or newer, as earlier versions have the underlying crypto/rand issue. Application developers must audit their code and middleware usage to confirm that UUID generation is secure and that no fallback to weak randomness occurs. Implementing runtime monitoring for unusual session or token reuse patterns can help detect exploitation attempts. Security teams should also review and strengthen session management, CSRF protections, and rate limiting configurations to reduce reliance on UUIDs alone. Where possible, consider integrating additional entropy sources or alternative secure random number generators. Finally, conduct penetration testing focused on session fixation and CSRF bypass scenarios to validate mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-05T15:42:44.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a24714b57a58fa1662675

Added to database: 2/9/2026, 6:16:17 PM

Last enriched: 2/17/2026, 9:40:27 AM

Last updated: 3/27/2026, 1:16:09 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses