A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 21 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Filecodebox
Filecodebox filecodebox
Vendors & Products Filecodebox
Filecodebox filecodebox

Thu, 20 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-305
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 20:00:00 +0000

Type Values Removed Values Added
Description A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-20T21:08:20.134Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-51663

cve-icon Vulnrichment

Updated: 2025-11-20T21:08:16.307Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T20:15:53.203

Modified: 2025-11-21T15:13:59.083

Link: CVE-2025-51663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-21T09:16:20Z