CVE-2025-66630
CRITICALFiber <2.52.11 - Info Disclosure
Title source: llmDescription
Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1.24, the underlying crypto/rand implementation can return an error if secure randomness cannot be obtained. Because no error is returned by the Fiber v2 UUID functions, application code may unknowingly rely on predictable, repeated, or low-entropy identifiers in security-critical pathways. This is especially impactful because many Fiber v2 middleware components (session middleware, CSRF, rate limiting, request-ID generation, etc.) default to using utils.UUIDv4(). This vulnerability is fixed in 2.52.11.
Scores
CVSS v3
9.4
EPSS
0.0002
EPSS Percentile
4.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Classification
CWE
CWE-338
Status
published
Affected Products (2)
gofiber/fiber
< 2.52.11Go
gofiber/fiber
< 2.52.11
Timeline
Published
Feb 09, 2026
Tracked Since
Feb 18, 2026