Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/gofiber/utils/v2
  4. ›
  5. CVE-2025-66565

CVE-2025-66565: Fiber Utils UUIDv4 and UUID Silent Fallback to Predictable Values

December 8, 2025 (updated December 12, 2025)

Critical security vulnerabilities exist in both the UUIDv4() and UUID() functions of the github.com/gofiber/utils package. When the system’s cryptographic random number generator (crypto/rand) fails, both functions silently fall back to returning predictable UUID values, the zero UUID "00000000-0000-0000-0000-000000000000". This compromises the security of all Fiber applications using these functions for security-critical operations on Go versions prior to 1.24.

Both functions are vulnerable to the same root cause (crypto/rand failure):

  • UUIDv4(): Indirect vulnerability through uuid.NewRandom() → crypto/rand.Read() → fallback to UUID()
  • UUID(): Direct vulnerability through crypto/rand.Read(uuidSeed[:]) → silent zero UUID return

Note: Go 1.24 and later panics on crypto/rand Read() failures, mitigating this vulnerability. Applications running on Go 1.24+ are not affected by the silent fallback behavior.


References

  • github.com/advisories/GHSA-m98w-cqp3-qcqr
  • github.com/gofiber/utils
  • github.com/gofiber/utils/commit/6c6cf047032b9c8dff43d29f990b4b10e9b02d47
  • github.com/gofiber/utils/security/advisories/GHSA-m98w-cqp3-qcqr
  • nvd.nist.gov/vuln/detail/CVE-2025-66565

Code Behaviors & Features

Detect and mitigate CVE-2025-66565 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.0.0-rc.4

Fixed versions

  • 2.0.0-rc.4

Solution

Upgrade to version 2.0.0-rc.4 or above.

Impact 7.7 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-252: Unchecked Return Value
  • CWE-331: Insufficient Entropy
  • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Source file

go/github.com/gofiber/utils/v2/CVE-2025-66565.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:20:00 +0000.