Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66482: CWE-307: Improper Restriction of Excessive Authentication Attempts in misskey-dev misskey

0
Medium
VulnerabilityCVE-2025-66482cvecve-2025-66482cwe-307cwe-1188
Published: Mon Dec 15 2025 (12/15/2025, 23:18:37 UTC)
Source: CVE Database V5
Vendor/Project: misskey-dev
Product: misskey

Description

Misskey is an open source, federated social media platform. Attackers who use an untrusted reverse proxy or not using a reverse proxy at all can bypass IP rate limiting by adding a forged X-Forwarded-For header. Starting with version 2025.9.1, an option (`trustProxy`) has been added in config file to prevent this from happening. However, it is initialized with an insecure default value before version 2025.12.0-alpha.2, making it still vulnerable if the configuration is not set correctly. This is patched in v2025.12.0-alpha.2 by flipping default value of `trustProxy` to `false`. Users of a trusted reverse proxy who are unsure if they manually overode this value should check their config for optimal behavior. Users are running Misskey with a trusted reverse proxy should not be affected by this vulnerability. From v2025.9.1 to v2025.11.1, workaround is available. Set `trustProxy: false` in config file.

AI-Powered Analysis

AILast updated: 12/15/2025, 23:45:17 UTC

Technical Analysis

Misskey is an open-source federated social media platform that supports decentralized communication. The vulnerability identified as CVE-2025-66482 arises from improper restriction of excessive authentication attempts (CWE-307) due to reliance on the X-Forwarded-For HTTP header for IP rate limiting. When Misskey is deployed without a trusted reverse proxy or with an insecure trustProxy configuration (default before v2025.12.0-alpha.2 is true), an attacker can forge the X-Forwarded-For header to bypass IP-based rate limiting controls. This allows unlimited authentication attempts from a single source IP perspective, facilitating brute force or credential stuffing attacks against user accounts. The vulnerability affects versions starting from 2025.9.1 up to but not including 2025.12.0-alpha.2. The vendor introduced a configuration option 'trustProxy' to control whether the platform trusts the reverse proxy headers. The default was insecurely set to true in affected versions, meaning the platform blindly trusts the X-Forwarded-For header, enabling the bypass. The issue is fixed in version 2025.12.0-alpha.2 by changing the default of trustProxy to false, requiring explicit configuration to trust proxies. Users behind a properly configured trusted reverse proxy are not vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N) indicates the attack can be performed remotely without authentication or user interaction, with low complexity, but with limited impact on confidentiality and integrity. No known exploits are currently in the wild. The vulnerability is categorized under CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-1188 (Incorrect Default Permissions).

Potential Impact

For European organizations running Misskey instances, this vulnerability can lead to successful brute force or credential stuffing attacks by bypassing IP rate limiting protections. This can result in unauthorized access to user accounts, potentially exposing personal data and undermining platform integrity. Given Misskey's federated nature, compromised accounts could be used to spread misinformation or malicious content across the network. The impact on confidentiality and integrity is limited but non-negligible, as attackers can gain unauthorized access to accounts. Availability impact is minimal as the vulnerability does not directly cause denial of service. Organizations without a trusted reverse proxy or with default insecure configurations are most at risk. This is particularly relevant for public-facing Misskey instances operated by European communities or organizations promoting decentralized social media. The medium severity rating reflects the balance between ease of exploitation and limited impact scope. However, the potential for large-scale brute force attacks could increase risk if left unmitigated.

Mitigation Recommendations

European organizations should immediately verify their Misskey deployment configurations, specifically the 'trustProxy' setting in the configuration file. If running versions between 2025.9.1 and 2025.11.1, set 'trustProxy: false' to disable trusting the X-Forwarded-For header unless a trusted reverse proxy is properly configured. Organizations should upgrade to version 2025.12.0-alpha.2 or later, where the default configuration is secure. Deploying a trusted reverse proxy that correctly sanitizes and controls forwarded headers is recommended to ensure accurate client IP detection. Additionally, implement multi-factor authentication (MFA) to reduce the risk of account compromise from brute force attacks. Monitoring authentication logs for unusual patterns of failed login attempts can help detect exploitation attempts. Educate administrators on the importance of secure proxy configurations and regularly audit configurations after upgrades. Finally, consider rate limiting based on other factors such as user accounts or device fingerprints to complement IP-based controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-02T17:09:52.016Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69409a3bd9bcdf3f3d093948

Added to database: 12/15/2025, 11:31:07 PM

Last enriched: 12/15/2025, 11:45:17 PM

Last updated: 12/17/2025, 10:02:09 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats