Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51663: n/a

0
High
VulnerabilityCVE-2025-51663cvecve-2025-51663
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.

AI-Powered Analysis

AILast updated: 11/26/2025, 21:04:27 UTC

Technical Analysis

CVE-2025-51663 is a vulnerability identified in the IPRateLimit feature of FileCodeBox, a file sharing and collaboration platform, affecting versions up to 2.2. The vulnerability arises because the application trusts the X-Real-IP and X-Forwarded-For HTTP headers to determine the client's IP address for rate limiting purposes. Attackers can exploit this by spoofing these headers, effectively bypassing IP-based rate limiting and failed attempt restrictions. This allows an attacker to perform denial-of-service (DoS) attacks by overwhelming the service with requests or to brute force share codes without being blocked by the rate limiting mechanism. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on availability. The weakness corresponds to CWE-305, which involves insufficient validation of input leading to security bypass. No patches or known exploits are currently documented, but the risk remains high given the nature of the flaw. The vulnerability impacts the confidentiality and integrity minimally but severely affects availability by enabling DoS attacks. The reliance on HTTP headers for IP identification is a common misconfiguration in web applications behind proxies or load balancers, making this a critical implementation flaw in FileCodeBox's rate limiting logic.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of FileCodeBox services, which may be used for internal and external file sharing and collaboration. Successful exploitation can lead to denial-of-service conditions, disrupting business operations and potentially causing data access delays. Additionally, the ability to brute force share codes could lead to unauthorized access to shared files, risking data leakage or compliance violations under regulations such as GDPR. Organizations relying solely on IP-based rate limiting for security controls will find these protections ineffective, increasing exposure to automated attacks. The disruption could affect sectors with high dependency on secure file sharing, including finance, healthcare, and government agencies. Moreover, the attack can be launched remotely without authentication, increasing the attack surface. The lack of known exploits currently provides a window for proactive mitigation, but the vulnerability's characteristics suggest it could be weaponized quickly once publicly known. The impact on confidentiality and integrity is limited but non-negligible if brute force leads to unauthorized data access. Overall, the threat undermines trust in FileCodeBox's security mechanisms and could lead to operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-51663, organizations should implement the following specific measures: 1) Avoid relying solely on HTTP headers like X-Real-IP and X-Forwarded-For for client IP identification; instead, configure trusted proxies or load balancers to sanitize and validate these headers or use alternative methods such as direct connection IPs or secure proxy protocols. 2) Implement additional authentication and authorization controls on share codes to reduce the risk of brute force attacks, such as multi-factor authentication or rate limiting based on user accounts rather than IP addresses. 3) Deploy Web Application Firewalls (WAFs) with rules to detect and block suspicious header spoofing or anomalous request patterns. 4) Monitor logs for unusual access patterns, including rapid repeated requests with varying spoofed IP headers. 5) Segment and isolate FileCodeBox services within the network to limit the blast radius of potential DoS attacks. 6) Engage with FileCodeBox vendors or community to obtain patches or updates addressing this vulnerability as they become available. 7) Educate security teams about the risks of trusting client-supplied headers and encourage secure coding practices. These steps go beyond generic advice by focusing on architectural changes and enhanced monitoring tailored to the nature of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e248d4d0ffcb40bb08686

Added to database: 11/19/2025, 8:11:57 PM

Last enriched: 11/26/2025, 9:04:27 PM

Last updated: 1/7/2026, 5:22:40 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats