Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66630: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in gofiber fiber

0
Critical
VulnerabilityCVE-2025-66630cvecve-2025-66630cwe-338
Published: Mon Feb 09 2026 (02/09/2026, 18:04:47 UTC)
Source: CVE Database V5
Vendor/Project: gofiber
Product: fiber

Description

CVE-2025-66630 is a critical vulnerability in the GoFiber web framework versions prior to 2. 52. 11, caused by the use of a cryptographically weak pseudo-random number generator (PRNG) in UUID generation. The underlying Go crypto/rand package can fail to provide secure randomness on Go versions before 1. 24, but Fiber’s UUID functions do not return errors, leading to predictable or low-entropy UUIDs. This affects many security-critical Fiber middleware components such as session management, CSRF protection, rate limiting, and request ID generation, potentially allowing attackers to predict or reuse identifiers. The vulnerability has a CVSS 4. 0 score of 9. 2 (critical) due to its impact on confidentiality and integrity without requiring authentication or user interaction. The issue is fixed in Fiber version 2.

AI-Powered Analysis

AILast updated: 02/09/2026, 18:30:41 UTC

Technical Analysis

CVE-2025-66630 is a vulnerability in the GoFiber web framework, specifically versions prior to 2.52.11, where the UUID generation relies on the Go crypto/rand package for secure random number generation. On Go versions before 1.24, the crypto/rand implementation can fail to provide secure randomness and return an error. However, Fiber’s UUID functions do not propagate this error, resulting in the generation of UUIDs with predictable, repeated, or low entropy values. This weakness is critical because many Fiber v2 middleware components—such as session middleware, CSRF protection, rate limiting, and request ID generation—default to using the vulnerable utils.UUIDv4() function. Consequently, security-critical identifiers may be guessable or reused, undermining confidentiality and integrity protections. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG). The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity, with low impact on availability. No known exploits are currently reported in the wild. The issue is resolved by upgrading Fiber to version 2.52.11 or later, which properly handles errors from crypto/rand and ensures secure UUID generation. Additionally, using Go runtime 1.24 or newer is necessary to avoid the underlying crypto/rand issue. Organizations relying on Fiber middleware for security-critical functions should prioritize patching to prevent potential exploitation that could lead to session hijacking, CSRF bypass, or abuse of rate limiting controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications built on the GoFiber framework, especially those using versions prior to 2.52.11 on Go runtimes older than 1.24. The predictable or low-entropy UUIDs can allow attackers to guess session identifiers, CSRF tokens, or request IDs, leading to unauthorized access, session hijacking, or bypass of security controls. This undermines confidentiality and integrity of user sessions and application data. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Fiber for web services could face data breaches, fraud, or service disruption. The vulnerability’s network attack vector and lack of required authentication mean attackers can exploit it remotely without user interaction, increasing the threat surface. Given the widespread use of Go in modern web development and Fiber’s popularity for high-performance web applications, the impact could be broad, affecting both public-facing services and internal applications. Failure to patch could also lead to compliance violations under GDPR and other data protection regulations due to compromised data security.

Mitigation Recommendations

1. Upgrade the GoFiber framework to version 2.52.11 or later immediately to ensure the UUID generation properly handles errors from the crypto/rand package and produces secure random values. 2. Upgrade the Go runtime environment to version 1.24 or newer, as earlier versions have known issues with crypto/rand that contribute to this vulnerability. 3. Conduct a thorough code review of all security-critical components that rely on UUIDs or random identifiers, verifying that no silent failures or fallback to weak randomness exist. 4. Implement additional monitoring and anomaly detection for session reuse, CSRF token reuse, or unusual request patterns that might indicate exploitation attempts. 5. Where possible, replace default Fiber middleware UUID generation with custom implementations that explicitly check for randomness errors and enforce entropy requirements. 6. Educate development and security teams about the risks of silent failures in cryptographic functions and the importance of error handling in security-sensitive code. 7. For legacy systems that cannot be immediately upgraded, consider compensating controls such as additional authentication layers or token rotation to reduce risk exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-05T15:42:44.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a24714b57a58fa1662675

Added to database: 2/9/2026, 6:16:17 PM

Last enriched: 2/9/2026, 6:30:41 PM

Last updated: 2/9/2026, 7:22:15 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats