Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25891: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gofiber fiber

0
High
VulnerabilityCVE-2026-25891cvecve-2026-25891cwe-22
Published: Tue Feb 24 2026 (02/24/2026, 21:08:48 UTC)
Source: CVE Database V5
Vendor/Project: gofiber
Product: fiber

Description

Fiber is an Express inspired web framework written in Go. A Path Traversal (CWE-22) vulnerability in Fiber allows a remote attacker to bypass the static middleware sanitizer and read arbitrary files on the server file system on Windows. This affects Fiber v3 through version 3.0.0. This has been patched in Fiber v3 version 3.1.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:50:24 UTC

Technical Analysis

Fiber is a popular web framework for Go, inspired by Express.js, widely used for building web applications and APIs. CVE-2026-25891 identifies a path traversal vulnerability (CWE-22) in Fiber's static middleware component that improperly restricts pathname access on Windows platforms. This flaw allows remote attackers to bypass the middleware's sanitization mechanisms and request files outside the designated static directory by manipulating URL paths. Specifically, the vulnerability affects Fiber versions from 3.0.0 up to but not including 3.1.0. The root cause is inadequate validation and normalization of file paths, which fails to prevent directory traversal sequences such as "..\" on Windows. Exploiting this vulnerability requires no authentication or user interaction, making it highly accessible to attackers. Successful exploitation can lead to unauthorized disclosure of sensitive files on the server, potentially exposing configuration files, source code, credentials, or other critical data. The vulnerability was publicly disclosed and assigned CVE-2026-25891 with a CVSS v4.0 base score of 7.7 (high severity), reflecting its network attack vector, low complexity, no privileges or user interaction required, and high confidentiality impact. The issue has been fixed in Fiber version 3.1.0 by improving path sanitization logic to properly restrict file access within the intended directory boundaries on Windows systems. No known exploits are reported in the wild as of the publication date, but the ease of exploitation and impact warrant immediate attention.

Potential Impact

This vulnerability poses a significant risk to organizations using the Fiber framework on Windows servers, as it enables attackers to read arbitrary files remotely without authentication. The confidentiality of sensitive data such as environment variables, private keys, database credentials, and proprietary source code can be compromised. This can lead to further attacks including privilege escalation, lateral movement, or data exfiltration. The integrity and availability of systems are not directly impacted by this vulnerability, but the exposure of critical information can indirectly facilitate more damaging attacks. Organizations relying on Fiber for web services, especially those hosting sensitive or regulated data, face increased risk of data breaches and compliance violations. The vulnerability's presence in a widely used framework increases the potential attack surface globally, particularly for applications deployed on Windows infrastructure. Although no exploits are currently known in the wild, the vulnerability's characteristics make it a likely target for attackers once public awareness grows.

Mitigation Recommendations

The primary mitigation is to upgrade Fiber to version 3.1.0 or later, where the vulnerability has been patched. Organizations should audit their applications to identify any usage of Fiber versions between 3.0.0 and 3.1.0, especially on Windows servers. Until upgrading is possible, administrators should consider disabling or restricting the static middleware serving functionality or implementing additional access controls at the web server or network level to prevent unauthorized file access. Employing Web Application Firewalls (WAFs) with rules to detect and block directory traversal patterns can provide temporary protection. Developers should review and harden path sanitization logic in custom middleware or extensions. Regularly monitoring logs for suspicious requests containing traversal sequences can help detect attempted exploitation. Finally, organizations should ensure sensitive files are not stored in web-accessible directories and follow the principle of least privilege for file system permissions to limit the impact of any successful traversal.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-06T21:08:39.130Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e178ab7ef31ef0b4219ea

Added to database: 2/24/2026, 9:26:34 PM

Last enriched: 3/4/2026, 1:50:24 AM

Last updated: 4/9/2026, 1:55:27 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses