Browse all 15 CVE security advisories affecting gofiber. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Go-Fiber is a lightweight Go web framework built on FastHTTP, designed for rapid development of high-performance web applications and APIs. Historically, it has been susceptible to common web vulnerabilities including Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation, often stemming from improper input validation and insecure default configurations. The framework's 15 recorded CVEs highlight recurring issues in parameter handling, authentication mechanisms, and middleware security. While no major public security incidents have been widely documented, the consistent pattern of vulnerabilities suggests developers should implement strict input sanitization, use secure middleware configurations, and stay current with security patches when building applications with this framework.
CVE-2026-258992026-02-25CVE-2025-666302026-02-10Showing up to 20 recent security advisories. View all →
This page lists every published CVE security advisory associated with gofiber. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.