{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25891","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-06T21:08:39.130Z","datePublished":"2026-02-24T21:08:48.675Z","dateUpdated":"2026-02-24T21:39:11.118Z"},"containers":{"cna":{"title":"Fiber has an Arbitrary File Read in Static Middleware on Windows","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/gofiber/fiber/security/advisories/GHSA-m3c2-496v-cw3v","tags":["x_refsource_CONFIRM"],"url":"https://github.com/gofiber/fiber/security/advisories/GHSA-m3c2-496v-cw3v"},{"name":"https://github.com/gofiber/fiber/pull/4064","tags":["x_refsource_MISC"],"url":"https://github.com/gofiber/fiber/pull/4064"},{"name":"https://github.com/gofiber/fiber/commit/59133702301c2ab7b776dd123b474cbd995f2c86","tags":["x_refsource_MISC"],"url":"https://github.com/gofiber/fiber/commit/59133702301c2ab7b776dd123b474cbd995f2c86"}],"affected":[{"vendor":"gofiber","product":"fiber","versions":[{"version":">= 3.0.0, < 3.1.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-24T21:08:48.675Z"},"descriptions":[{"lang":"en","value":"Fiber is an Express inspired web framework written in Go. A Path Traversal (CWE-22) vulnerability in Fiber allows a remote attacker to bypass the static middleware sanitizer and read arbitrary files on the server file system on Windows. This affects Fiber v3 through version 3.0.0. This has been patched in Fiber v3 version 3.1.0."}],"source":{"advisory":"GHSA-m3c2-496v-cw3v","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-24T21:39:00.083530Z","id":"CVE-2026-25891","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-24T21:39:11.118Z"}}]}}