Fix Viper — CVE-2022-32149 MEDIUM

Fix CVE-2022-32149 (MEDIUM) in Viper for Go. Paste your go.mod into PackageFix and get a patched version — no CLI, no signup. Path traversal in config file loading.

⚠ Vulnerability

CVE-2022-32149 (MEDIUM) — path traversal in config file loading in Viper below v1.18.2.

Vulnerable — go.mod

github.com/spf13/viper v1.14.0

Fixed — go.mod

github.com/spf13/viper v1.18.2
✓ Fix

Update Viper to v1.18.2 and run go mod tidy.

Paste your manifest — get back a fixed version with all CVEs patched in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

CVE Details

FieldValue
CVE IDCVE-2022-32149
SeverityMEDIUM
PackageViper (Go)
Safe versionv1.18.2
CISA KEV
DescriptionPath traversal in config file loading

Frequently Asked Questions

What is CVE-2022-32149?
CVE-2022-32149 is a MEDIUM severity vulnerability in Viper (Go) that allows path traversal in config file loading. Update to v1.18.2 or later.
How do I fix CVE-2022-32149 in Viper?
Update Viper to version v1.18.2 in your go.mod and run go mod tidy.
Is CVE-2022-32149 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2022-32149?
After updating, paste your go.mod into PackageFix again. If CVE-2022-32149 no longer appears in the CVE table, the fix is applied.

Related Guides