This repository was archived by the owner on Feb 3, 2026. It is now read-only.
Update module github.com/gofiber/fiber/v2 to v2.52.9 [SECURITY]#294
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
Update module github.com/gofiber/fiber/v2 to v2.52.9 [SECURITY]#294renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
|
Contributor
Author
ℹ️ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.



This PR contains the following updates:
v2.52.5→v2.52.9GitHub Vulnerability Alerts
CVE-2025-54801
Description
When using Fiber's
Ctx.BodyParserto parse form data containing a large numeric key that represents a slice index (e.g.,test.18446744073704), the application crashes due to an out-of-bounds slice allocation in the underlying schema decoder.The root cause is that the decoder attempts to allocate a slice of length
idx + 1without validating whether the index is within a safe or reasonable range. Ifidxis excessively large, this leads to an integer overflow or memory exhaustion, causing a panic or crash.Steps to Reproduce
Create a POST request handler that accepts
x-www-form-urlencodeddataRun the server and send a POST request with a large numeric key in form data, such as:
Relevant Code Snippet
Within the decoder's decode method:
The
idxis not validated before use, leading to unsafe slice allocation for extremely large values.Impact
Release Notes
gofiber/fiber (github.com/gofiber/fiber/v2)
v2.52.9Compare Source
🐛 Bug Fixes
Is()by @gaby in #3537Full Changelog: gofiber/fiber@v2.52.8...v2.52.9
v2.52.8Compare Source
👮 Security
🧹 Updates
🐛 Bug Fixes
📚 Documentation
Full Changelog: gofiber/fiber@v2.52.6...v2.52.8
v2.52.7Compare Source
v2.52.6Compare Source
🐛 Bug Fixes
📚 Documentation
🛠️ Maintenance
Full Changelog: gofiber/fiber@v2.52.5...v2.52.6
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.