Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25899: CWE-789: Memory Allocation with Excessive Size Value in gofiber fiber

0
High
VulnerabilityCVE-2026-25899cvecve-2026-25899cwe-789
Published: Tue Feb 24 2026 (02/24/2026, 21:11:17 UTC)
Source: CVE Database V5
Vendor/Project: gofiber
Product: fiber

Description

Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.

AI-Powered Analysis

AILast updated: 02/24/2026, 21:40:45 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25899 affects the gofiber fiber web framework, a popular Express-inspired framework written in Go. Specifically, versions on the v3 branch prior to 3.1.0 contain a flaw in handling the fiber_flash cookie. This cookie is processed via msgpack deserialization without proper validation of the size parameter, allowing an attacker to craft a 10-character cookie value that triggers an attempt to allocate an extremely large amount of memory—up to approximately 85GB. This unbounded memory allocation is a classic example of CWE-789 (Memory Allocation with Excessive Size Value). Because the vulnerability is in the core request handling, it affects all endpoints using GoFiber v3, regardless of whether the application uses flash messages or not. The attack vector requires no authentication or user interaction, making it remotely exploitable over the network. The excessive memory allocation can cause the server process to consume all available memory, leading to denial of service (DoS) conditions. The vulnerability was publicly disclosed on February 24, 2026, with a CVSS v3.1 score of 7.5 (high severity), reflecting its ease of exploitation and impact on availability. The fix was introduced in version 3.1.0 by adding proper validation to the deserialization process to prevent excessive memory allocation.

Potential Impact

This vulnerability poses a significant risk to organizations running web applications on GoFiber v3 prior to 3.1.0. An attacker can remotely cause a denial of service by forcing the server to allocate massive amounts of memory, potentially crashing the application or the entire host system. This can lead to service outages, degraded performance, and increased operational costs due to recovery efforts. Since no authentication is required, attackers can exploit this vulnerability at scale, potentially targeting critical web services and APIs built on GoFiber. The impact is limited to availability; confidentiality and integrity are not directly affected. However, prolonged downtime or repeated attacks could indirectly affect business continuity and reputation. Organizations relying on GoFiber for high-availability services or those exposed to the internet are particularly at risk. The absence of known exploits in the wild suggests the vulnerability is newly disclosed, but the ease of exploitation means attackers may develop exploits rapidly.

Mitigation Recommendations

The primary mitigation is to upgrade all affected GoFiber instances to version 3.1.0 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, organizations should implement strict input validation and filtering at the web server or application firewall level to block or sanitize the fiber_flash cookie. Monitoring for unusually large or malformed cookies can help detect exploitation attempts. Rate limiting and IP reputation-based blocking can reduce exposure to automated attacks. Additionally, deploying resource limits and memory usage caps at the container or operating system level can mitigate the impact of excessive memory allocation attempts. Application developers should audit their use of third-party libraries for similar deserialization vulnerabilities and apply secure coding practices to prevent unbounded allocations. Regular vulnerability scanning and patch management processes should be enforced to ensure timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-06T21:08:39.131Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e178ab7ef31ef0b4219f0

Added to database: 2/24/2026, 9:26:34 PM

Last enriched: 2/24/2026, 9:40:45 PM

Last updated: 2/25/2026, 12:02:07 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats