
Cloud Vulnerability DB
A community-led vulnerabilities database
Fiber, an Express-inspired web framework written in Go, contains a vulnerability (CVE-2025-48075) in versions 2.52.6 and prior to version 2.52.7. The vulnerability was discovered in the fiber.Ctx.BodyParser functionality, which can map flat data to nested slices using key[idx]value syntax. The issue was disclosed on May 22, 2025 (GitHub Advisory).
The vulnerability occurs when the fiber.Ctx.BodyParser attempts to process a negative index value in the slice mapping syntax. Instead of properly handling the invalid input and returning an error, the parser triggers a panic. This is due to an improper validation of array indices, identified as CWE-129. The vulnerability has been assigned a CVSS v4.0 score of 7.7 HIGH with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P (NVD).
Since the input data is user-provided, this vulnerability could lead to a denial of service condition for applications relying on the fiber.Ctx.BodyParser functionality. When exploited, the application will crash due to an unhandled panic, making the service unavailable (GitHub Advisory).
The vulnerability has been fixed in version 2.52.7 of the Fiber framework. Users are advised to upgrade to this version to address the issue. The fix includes proper error handling for invalid array indices instead of panicking (GitHub Advisory, Fiber Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."