Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66204: CWE-307: Improper Restriction of Excessive Authentication Attempts in WBCE WBCE_CMS

0
Medium
VulnerabilityCVE-2025-66204cvecve-2025-66204cwe-307cwe-693
Published: Mon Dec 08 2025 (12/08/2025, 23:50:58 UTC)
Source: CVE Database V5
Vendor/Project: WBCE
Product: WBCE_CMS

Description

WBCE CMS is a content management system. Version 1.6.4 contains a brute-force protection bypass where an attacker can indefinitely reset the counter by modifying `X-Forwarded-For` on each request, gaining unlimited password guessing attempts, effectively bypassing all brute-force protection. The application fully trusts the `X-Forwarded-For` header without validating it or restricting its usage. This issue is fixed in version 1.6.5.

AI-Powered Analysis

AILast updated: 12/16/2025, 06:02:23 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66204 affects WBCE CMS version 1.6.4, a content management system widely used for website management. The core issue lies in improper restriction of excessive authentication attempts (CWE-307) combined with the system's full trust in the X-Forwarded-For HTTP header without validation (CWE-693). Normally, brute-force protection mechanisms limit the number of failed login attempts to prevent attackers from guessing passwords. However, in this case, the application uses the X-Forwarded-For header to track the source IP address of login attempts. Because this header can be arbitrarily set by an attacker, they can modify it on each request to reset the failed login attempt counter indefinitely. This effectively bypasses the brute-force protection, allowing unlimited password guessing attempts without triggering lockouts or rate limiting. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS 4.0 score is 6.3 (medium), reflecting the network attack vector, high complexity, and lack of user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability was published on December 8, 2025, and is fixed in WBCE CMS version 1.6.5. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations using WBCE CMS version 1.6.4, this vulnerability poses a significant risk of unauthorized access through brute-force attacks. Attackers can exploit the flaw to attempt unlimited password guesses, increasing the likelihood of credential compromise, especially if weak or reused passwords are in use. Successful exploitation could lead to account takeover, unauthorized content modification, data leakage, or further lateral movement within the network. Given that WBCE CMS is used for website content management, this could impact the integrity and availability of public-facing websites, damaging organizational reputation and potentially violating data protection regulations such as GDPR if personal data is exposed. The medium severity rating indicates a moderate but actionable risk, particularly for organizations with high-value web assets or sensitive information hosted on WBCE CMS.

Mitigation Recommendations

To mitigate this vulnerability, affected organizations should immediately upgrade WBCE CMS to version 1.6.5 or later, where the issue is fixed. In addition, organizations should implement server-side validation of the X-Forwarded-For header, ensuring it is only trusted when coming from known and secure reverse proxies or load balancers. If possible, disable reliance on client-controlled headers for authentication rate limiting. Employ additional brute-force protection mechanisms such as account lockouts based on user identifiers rather than IP addresses, CAPTCHA challenges after multiple failed attempts, and multi-factor authentication (MFA) to reduce the risk of credential compromise. Monitoring and alerting on unusual login patterns and failed authentication attempts can help detect exploitation attempts. Network-level protections such as web application firewalls (WAFs) can also be configured to detect and block suspicious header manipulation. Finally, enforce strong password policies and conduct regular security awareness training to reduce the risk of successful brute-force attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.677Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693765059bbcd7dc91c9e948

Added to database: 12/8/2025, 11:53:41 PM

Last enriched: 12/16/2025, 6:02:23 AM

Last updated: 2/7/2026, 8:44:39 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats