Description
Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.
Published: 2026-02-24
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Immediately
AI Analysis

Impact

The vulnerability resides in the handling of the fiber_flash cookie within the GoFiber web framework. A specially crafted 10‑character cookie value triggers unvalidated msgpack deserialization, causing the framework to attempt allocating up to 85 GB of memory. Successful exploitation forces the server to consume excessive resources, leading to degraded performance or a crash, thereby denying legitimate users access. The flaw is reflected in the CVE’s CWE identifiers for uncontrolled resource consumption and buffer overflow. No authentication is required, meaning any client can trigger the denial.

Affected Systems

This flaw affects all ships of GoFiber v3 released prior to version 3.1.0. The framework, written in Go and inspired by Express, is distributed under the gofiber:fiber product line. The issue is present in every endpoint because flash messages are processed globally, regardless of whether the application uses them.

Risk and Exploitability

The CVSS base score of 7.5 indicates a high severity, while the EPSS score of less than 1 % signals that exploitation is currently rare but not impossible. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, so no publicly documented exploits exist at this time. Likely exploitation would involve sending a malicious request with the crafted flash cookie over the network; since no credentials are needed, the attacker only requires network access to the target web application.

Generated by OpenCVE AI on April 17, 2026 at 15:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GoFiber to version 3.1.0 or later, which removes the unbounded allocation bug.
  • If an upgrade cannot be performed immediately, remove or disable the use of flash messages in the application or implement input validation that rejects flash_cookie values longer than the safe threshold.
  • Apply application‑level resource limits or CPU/memory quotas to the GoFiber process, and monitor for abnormal memory consumption that could indicate an attempted denial‑of‑service attack.

Generated by OpenCVE AI on April 17, 2026 at 15:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2mr3-m5q5-wgp6 Fiber is Vulnerable to Denial of Service via Flash Cookie Unbounded Allocation
History

Wed, 25 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
CPEs cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Gofiber
Gofiber fiber
Vendors & Products Gofiber
Gofiber fiber

Tue, 24 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.
Title Fiber is Vulnerable to Denial of Service via Flash Cookie Unbounded Allocation
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T21:37:33.970Z

Reserved: 2026-02-06T21:08:39.131Z

Link: CVE-2026-25899

cve-icon Vulnrichment

Updated: 2026-02-24T21:37:28.560Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T22:16:31.613

Modified: 2026-02-25T20:31:50.943

Link: CVE-2026-25899

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:45:15Z

Weaknesses