CVE-2025-54801
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-06

Last updated on: 2025-09-23

Assigner: GitHub, Inc.

Description
Fiber is an Express inspired web framework written in Go. In versions 2.52.8 and below, when using Fiber's Ctx.BodyParser to parse form data containing a large numeric key that represents a slice index (e.g., test.18446744073704), the application crashes due to an out-of-bounds slice allocation in the underlying schema decoder. The root cause is that the decoder attempts to allocate a slice of length idx + 1 without validating whether the index is within a safe or reasonable range. If the idx is excessively large, this leads to an integer overflow or memory exhaustion, causing a panic or crash. This is fixed in version 2.52.9.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-06
Last Modified
2025-09-23
Generated
2026-05-07
AI Q&A
2025-08-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gofiber fiber to 2.52.9 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-789 The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Fiber web framework (version 2.52.8 and below) when parsing form data with a large numeric key representing a slice index. The underlying schema decoder tries to allocate a slice with a length based on this large index without validating if the index is safe or reasonable. If the index is excessively large, it causes an integer overflow or memory exhaustion, leading to a panic or crash of the application. This issue is fixed in version 2.52.9.


How can this vulnerability impact me? :

This vulnerability can cause the application using Fiber to crash or panic when processing specially crafted form data with large numeric keys. This can lead to denial of service, making the application unavailable to legitimate users until it is restarted or fixed.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the Fiber web framework to version 2.52.9 or later, where this vulnerability is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart