Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-66630

Опубликовано: 09 фев. 2026
Источник: nvd
CVSS3: 9.4
EPSS Низкий

Описание

Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1.24, the underlying crypto/rand implementation can return an error if secure randomness cannot be obtained. Because no error is returned by the Fiber v2 UUID functions, application code may unknowingly rely on predictable, repeated, or low-entropy identifiers in security-critical pathways. This is especially impactful because many Fiber v2 middleware components (session middleware, CSRF, rate limiting, request-ID generation, etc.) default to using utils.UUIDv4(). This vulnerability is fixed in 2.52.11.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*
Версия до 2.52.11 (исключая)
cpe:2.3:a:golang:go:*:-:*:*:*:*:*:*
Версия до 1.24.0 (исключая)

EPSS

Процентиль: 5%
0.00019
Низкий

9.4 Critical

CVSS3

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 7.7
redhat
около 2 месяцев назад

Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1.24, the underlying crypto/rand implementation can return an error if secure randomness cannot be obtained. Because no error is returned by the Fiber v2 UUID functions, application code may unknowingly rely on predictable, repeated, or low-entropy identifiers in security-critical pathways. This is especially impactful because many Fiber v2 middleware components (session middleware, CSRF, rate limiting, request-ID generation, etc.) default to using utils.UUIDv4(). This vulnerability is fixed in 2.52.11.

github
около 2 месяцев назад

Fiber has an insecure fallback in utils.UUIDv4() / utils.UUID() — predictable / zero‑UUID on crypto/rand failure

EPSS

Процентиль: 5%
0.00019
Низкий

9.4 Critical

CVSS3

Дефекты

CWE-338