CVE-2025-51663

A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lanol:filecodebox:*:*:*:*:*:*:*:*

History

24 Nov 2025, 19:29

Type Values Removed Values Added
First Time Lanol filecodebox
Lanol
CPE cpe:2.3:a:lanol:filecodebox:*:*:*:*:*:*:*:*
References () https://github.com/vastsa/FileCodeBox - () https://github.com/vastsa/FileCodeBox - Product
References () https://github.com/vastsa/FileCodeBox/issues/350 - () https://github.com/vastsa/FileCodeBox/issues/350 - Exploit, Issue Tracking

20 Nov 2025, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-305

19 Nov 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 20:15

Updated : 2025-11-24 19:29


NVD link : CVE-2025-51663

Mitre link : CVE-2025-51663

CVE.ORG link : CVE-2025-51663


JSON object : View

Products Affected

lanol

  • filecodebox
CWE
CWE-305

Authentication Bypass by Primary Weakness