CVE-2025-51663
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-19

Last updated on: 2025-11-24

Assigner: MITRE

Description
A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-19
Last Modified
2025-11-24
Generated
2026-05-07
AI Q&A
2025-11-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lanol filecodebox to 2.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-305 The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

Attackers can exploit this vulnerability to perform denial-of-service (DoS) attacks or brute force share codes by circumventing rate limits and failed attempt protections.


Can you explain this vulnerability to me?

This vulnerability in the IPRateLimit implementation of FileCodeBox up to version 2.2 allows remote attackers to bypass IP-based rate limiting and failed attempt restrictions by faking the X-Real-IP and X-Forwarded-For HTTP headers.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart