CVE-2025-51663
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-24
Assigner: MITRE
Description
Description
A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lanol | filecodebox | to 2.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-305 | The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
Attackers can exploit this vulnerability to perform denial-of-service (DoS) attacks or brute force share codes by circumventing rate limits and failed attempt protections.
Can you explain this vulnerability to me?
This vulnerability in the IPRateLimit implementation of FileCodeBox up to version 2.2 allows remote attackers to bypass IP-based rate limiting and failed attempt restrictions by faking the X-Real-IP and X-Forwarded-For HTTP headers.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70