Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66482: CWE-307: Improper Restriction of Excessive Authentication Attempts in misskey-dev misskey

0
Medium
VulnerabilityCVE-2025-66482cvecve-2025-66482cwe-307cwe-1188
Published: Mon Dec 15 2025 (12/15/2025, 23:18:37 UTC)
Source: CVE Database V5
Vendor/Project: misskey-dev
Product: misskey

Description

Misskey is an open source, federated social media platform. Attackers who use an untrusted reverse proxy or not using a reverse proxy at all can bypass IP rate limiting by adding a forged X-Forwarded-For header. Starting with version 2025.9.1, an option (`trustProxy`) has been added in config file to prevent this from happening. However, it is initialized with an insecure default value before version 2025.12.0-alpha.2, making it still vulnerable if the configuration is not set correctly. This is patched in v2025.12.0-alpha.2 by flipping default value of `trustProxy` to `false`. Users of a trusted reverse proxy who are unsure if they manually overode this value should check their config for optimal behavior. Users are running Misskey with a trusted reverse proxy should not be affected by this vulnerability. From v2025.9.1 to v2025.11.1, workaround is available. Set `trustProxy: false` in config file.

AI-Powered Analysis

AILast updated: 12/23/2025, 00:20:42 UTC

Technical Analysis

Misskey is an open-source federated social media platform that implements IP-based rate limiting to prevent excessive authentication attempts, a common defense against brute-force attacks. CVE-2025-66482 arises from improper handling of the X-Forwarded-For HTTP header, which is used to identify the originating IP address of a client connecting through a reverse proxy. If an attacker controls or uses an untrusted reverse proxy or no proxy at all, they can forge this header to bypass IP rate limiting, effectively circumventing protections designed to limit authentication attempts per IP. This vulnerability is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-1188 (Incorrect Default Permissions). Starting with Misskey version 2025.9.1, a configuration option 'trustProxy' was introduced to control whether the platform trusts the X-Forwarded-For header. However, before version 2025.12.0-alpha.2, this option defaults to an insecure value (true), meaning the platform trusts the header by default, leaving it vulnerable if the administrator does not explicitly set 'trustProxy' to false. The vulnerability is patched in version 2025.12.0-alpha.2 by changing the default of 'trustProxy' to false, thereby not trusting the header unless explicitly configured. Users behind a properly configured trusted reverse proxy are not affected, as the proxy correctly manages client IPs. No known exploits are reported in the wild yet. The CVSS 4.0 score is 6.9 (medium), reflecting network attack vector, no privileges or user interaction required, and partial impact on confidentiality and availability due to potential brute-force attacks.

Potential Impact

For European organizations using Misskey versions between 2025.9.1 and 2025.11.1 without proper configuration, this vulnerability can allow attackers to bypass IP-based rate limiting on authentication attempts. This can lead to increased risk of brute-force or credential stuffing attacks, potentially resulting in unauthorized account access, data exposure, and reputational damage. Since Misskey is a federated social media platform, compromised accounts could be used to spread misinformation or malicious content, impacting trust and platform integrity. Additionally, excessive authentication attempts could degrade service availability due to resource exhaustion. Organizations relying on Misskey for internal or community communication may face operational disruptions. The impact is mitigated for those using trusted reverse proxies correctly configured or running patched versions. However, the federated nature of Misskey means that vulnerabilities in one instance can have cascading effects across the network, increasing the importance of timely mitigation in Europe where federated social media adoption is growing.

Mitigation Recommendations

European organizations should immediately verify their Misskey deployment version and configuration. If running versions from 2025.9.1 to before 2025.12.0-alpha.2, they must set 'trustProxy: false' explicitly in the configuration file unless they are certain their reverse proxy is trusted and correctly configured. Upgrading to version 2025.12.0-alpha.2 or later is strongly recommended to benefit from the secure default. Organizations should audit their reverse proxy setups to ensure they are trusted and properly forwarding client IPs without allowing header forgery. Implement additional multi-factor authentication (MFA) to reduce the risk of account compromise from brute-force attacks. Monitoring authentication logs for unusual patterns of failed attempts can help detect exploitation attempts early. Network-level rate limiting and Web Application Firewalls (WAFs) can provide additional layers of defense. Finally, educating administrators about the importance of correct 'trustProxy' configuration and maintaining up-to-date software is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T17:09:52.016Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69409a3bd9bcdf3f3d093948

Added to database: 12/15/2025, 11:31:07 PM

Last enriched: 12/23/2025, 12:20:42 AM

Last updated: 2/7/2026, 8:43:49 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats