CVE-2025-66204: CWE-307: Improper Restriction of Excessive Authentication Attempts in WBCE WBCE_CMS
WBCE CMS is a content management system. Version 1.6.4 contains a brute-force protection bypass where an attacker can indefinitely reset the counter by modifying `X-Forwarded-For` on each request, gaining unlimited password guessing attempts, effectively bypassing all brute-force protection. The application fully trusts the `X-Forwarded-For` header without validating it or restricting its usage. This issue is fixed in version 1.6.5.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-66204 affects WBCE CMS version 1.6.4, a content management system widely used for website management. The core issue lies in improper restriction of excessive authentication attempts (CWE-307) combined with the system's full trust in the X-Forwarded-For HTTP header without validation (CWE-693). Normally, brute-force protection mechanisms limit the number of failed login attempts to prevent attackers from guessing passwords. However, in this case, the application uses the X-Forwarded-For header to track the source IP address of login attempts. Because this header can be arbitrarily set by an attacker, they can modify it on each request to reset the failed login attempt counter indefinitely. This effectively bypasses the brute-force protection, allowing unlimited password guessing attempts without triggering lockouts or rate limiting. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS 4.0 score is 6.3 (medium), reflecting the network attack vector, high complexity, and lack of user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability was published on December 8, 2025, and is fixed in WBCE CMS version 1.6.5. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using WBCE CMS version 1.6.4, this vulnerability poses a significant risk of unauthorized access through brute-force attacks. Attackers can exploit the flaw to attempt unlimited password guesses, increasing the likelihood of credential compromise, especially if weak or reused passwords are in use. Successful exploitation could lead to account takeover, unauthorized content modification, data leakage, or further lateral movement within the network. Given that WBCE CMS is used for website content management, this could impact the integrity and availability of public-facing websites, damaging organizational reputation and potentially violating data protection regulations such as GDPR if personal data is exposed. The medium severity rating indicates a moderate but actionable risk, particularly for organizations with high-value web assets or sensitive information hosted on WBCE CMS.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should immediately upgrade WBCE CMS to version 1.6.5 or later, where the issue is fixed. In addition, organizations should implement server-side validation of the X-Forwarded-For header, ensuring it is only trusted when coming from known and secure reverse proxies or load balancers. If possible, disable reliance on client-controlled headers for authentication rate limiting. Employ additional brute-force protection mechanisms such as account lockouts based on user identifiers rather than IP addresses, CAPTCHA challenges after multiple failed attempts, and multi-factor authentication (MFA) to reduce the risk of credential compromise. Monitoring and alerting on unusual login patterns and failed authentication attempts can help detect exploitation attempts. Network-level protections such as web application firewalls (WAFs) can also be configured to detect and block suspicious header manipulation. Finally, enforce strong password policies and conduct regular security awareness training to reduce the risk of successful brute-force attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-66204: CWE-307: Improper Restriction of Excessive Authentication Attempts in WBCE WBCE_CMS
Description
WBCE CMS is a content management system. Version 1.6.4 contains a brute-force protection bypass where an attacker can indefinitely reset the counter by modifying `X-Forwarded-For` on each request, gaining unlimited password guessing attempts, effectively bypassing all brute-force protection. The application fully trusts the `X-Forwarded-For` header without validating it or restricting its usage. This issue is fixed in version 1.6.5.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-66204 affects WBCE CMS version 1.6.4, a content management system widely used for website management. The core issue lies in improper restriction of excessive authentication attempts (CWE-307) combined with the system's full trust in the X-Forwarded-For HTTP header without validation (CWE-693). Normally, brute-force protection mechanisms limit the number of failed login attempts to prevent attackers from guessing passwords. However, in this case, the application uses the X-Forwarded-For header to track the source IP address of login attempts. Because this header can be arbitrarily set by an attacker, they can modify it on each request to reset the failed login attempt counter indefinitely. This effectively bypasses the brute-force protection, allowing unlimited password guessing attempts without triggering lockouts or rate limiting. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS 4.0 score is 6.3 (medium), reflecting the network attack vector, high complexity, and lack of user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability was published on December 8, 2025, and is fixed in WBCE CMS version 1.6.5. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using WBCE CMS version 1.6.4, this vulnerability poses a significant risk of unauthorized access through brute-force attacks. Attackers can exploit the flaw to attempt unlimited password guesses, increasing the likelihood of credential compromise, especially if weak or reused passwords are in use. Successful exploitation could lead to account takeover, unauthorized content modification, data leakage, or further lateral movement within the network. Given that WBCE CMS is used for website content management, this could impact the integrity and availability of public-facing websites, damaging organizational reputation and potentially violating data protection regulations such as GDPR if personal data is exposed. The medium severity rating indicates a moderate but actionable risk, particularly for organizations with high-value web assets or sensitive information hosted on WBCE CMS.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should immediately upgrade WBCE CMS to version 1.6.5 or later, where the issue is fixed. In addition, organizations should implement server-side validation of the X-Forwarded-For header, ensuring it is only trusted when coming from known and secure reverse proxies or load balancers. If possible, disable reliance on client-controlled headers for authentication rate limiting. Employ additional brute-force protection mechanisms such as account lockouts based on user identifiers rather than IP addresses, CAPTCHA challenges after multiple failed attempts, and multi-factor authentication (MFA) to reduce the risk of credential compromise. Monitoring and alerting on unusual login patterns and failed authentication attempts can help detect exploitation attempts. Network-level protections such as web application firewalls (WAFs) can also be configured to detect and block suspicious header manipulation. Finally, enforce strong password policies and conduct regular security awareness training to reduce the risk of successful brute-force attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.677Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693765059bbcd7dc91c9e948
Added to database: 12/8/2025, 11:53:41 PM
Last enriched: 12/16/2025, 6:02:23 AM
Last updated: 2/7/2026, 8:44:39 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
MediumCVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.