Description
MyTube is a self-hosted downloader and player for several video websites. Prior to version 1.7.71, a rate limiting bypass via `X-Forwarded-For` header spoofing allows unauthenticated attackers to bypass IP-based rate limiting on general API endpoints. Attackers can spoof client IPs by manipulating the `X-Forwarded-For` header, enabling unlimited requests to protected endpoints, including general API endpoints (enabling DoS) and other rate-limited functionality. Version 1.7.71 contains a patch for the issue.
Published: 2026-01-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Rate Limiting Bypass
Action: Apply Patch
AI Analysis

Impact

MyTube, a self‑hosted downloader and player, allows unauthenticated users to craft an X‑Forwarded‑For header that convinces the application to treat the request as coming from a different IP. The application performs rate limiting solely on the client IP it sees, so by spoofing that header an attacker can send an unlimited number of requests to any rate‑limited API endpoint. The result is a denial‑of‑service scenario, with the ability to exhaust resources or prevent legitimate users from accessing the service.

Affected Systems

The vulnerability exists in all releases of Franklioxygen MyTube up to and including version 1.7.70. Version 1.7.71 and later contain a patch that eliminates the rate‑limiting bypass.

Risk and Exploitability

The CVSS score is 6.5, indicating a medium level of severity. The EPSS score is below 1 %, suggesting a very small probability of exploitation in the wild, and the issue is not listed in the CISA KEV catalog. The attack vector requires only the ability to send HTTP requests with an arbitrary X‑Forwarded‑For header, so any unauthenticated victim could carry it out through a standard web server.

Generated by OpenCVE AI on April 18, 2026 at 04:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MyTube to version 1.7.71 or later to apply the official patch that removes the unvalidated use of the X‑Forwarded‑For header in rate‑limiting logic.
  • If upgrading immediately is not possible, configure the reverse proxy or the application to ignore or strip X‑Forwarded‑For headers so that the server uses only the true source IP for rate limiting.
  • As a longer‑term measure, enforce stricter rate‑limiting rules that do not rely on a single header, and audit the application to ensure all user‑supplied headers are properly validated before influencing security controls.

Generated by OpenCVE AI on April 18, 2026 at 04:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:franklioxygen:mytube:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Franklioxygen
Franklioxygen mytube
Vendors & Products Franklioxygen
Franklioxygen mytube

Mon, 19 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description MyTube is a self-hosted downloader and player for several video websites. Prior to version 1.7.71, a rate limiting bypass via `X-Forwarded-For` header spoofing allows unauthenticated attackers to bypass IP-based rate limiting on general API endpoints. Attackers can spoof client IPs by manipulating the `X-Forwarded-For` header, enabling unlimited requests to protected endpoints, including general API endpoints (enabling DoS) and other rate-limited functionality. Version 1.7.71 contains a patch for the issue.
Title MyTube has Rate Limiting Bypass via X-Forwarded-For Header Spoofing
Weaknesses CWE-807
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}


Subscriptions

Franklioxygen Mytube
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T20:04:56.547Z

Reserved: 2026-01-16T15:46:40.843Z

Link: CVE-2026-23848

cve-icon Vulnrichment

Updated: 2026-01-20T20:03:56.970Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T21:15:51.433

Modified: 2026-02-02T13:27:34.320

Link: CVE-2026-23848

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses