A lack of rate limiting in the login page of shiori v1.7.4 and below allows attackers to bypass authentication via a brute force attack.
References
| Link | Resource |
|---|---|
| https://github.com/go-shiori/shiori | Product |
| https://github.com/go-shiori/shiori/issues/1138 | Issue Tracking |
Configurations
History
22 Jan 2026, 21:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/go-shiori/shiori - Product | |
| References | () https://github.com/go-shiori/shiori/issues/1138 - Issue Tracking | |
| First Time |
Go-shiori shiori
Go-shiori |
|
| CPE | cpe:2.3:a:go-shiori:shiori:*:*:*:*:*:go:*:* |
09 Jan 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-290 |
09 Jan 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-09 21:16
Updated : 2026-01-22 21:39
NVD link : CVE-2025-60538
Mitre link : CVE-2025-60538
CVE.ORG link : CVE-2025-60538
JSON object : View
Products Affected
go-shiori
- shiori
CWE
CWE-290
Authentication Bypass by Spoofing
