CVE-2025-66482: CWE-307: Improper Restriction of Excessive Authentication Attempts in misskey-dev misskey
Misskey is an open source, federated social media platform. Attackers who use an untrusted reverse proxy or not using a reverse proxy at all can bypass IP rate limiting by adding a forged X-Forwarded-For header. Starting with version 2025.9.1, an option (`trustProxy`) has been added in config file to prevent this from happening. However, it is initialized with an insecure default value before version 2025.12.0-alpha.2, making it still vulnerable if the configuration is not set correctly. This is patched in v2025.12.0-alpha.2 by flipping default value of `trustProxy` to `false`. Users of a trusted reverse proxy who are unsure if they manually overode this value should check their config for optimal behavior. Users are running Misskey with a trusted reverse proxy should not be affected by this vulnerability. From v2025.9.1 to v2025.11.1, workaround is available. Set `trustProxy: false` in config file.
AI Analysis
Technical Summary
Misskey is an open-source federated social media platform that implements IP-based rate limiting to prevent excessive authentication attempts, a common defense against brute-force attacks. CVE-2025-66482 arises from improper handling of the X-Forwarded-For HTTP header, which is used to identify the originating IP address of a client connecting through a reverse proxy. If an attacker controls or uses an untrusted reverse proxy or no proxy at all, they can forge this header to bypass IP rate limiting, effectively circumventing protections designed to limit authentication attempts per IP. This vulnerability is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-1188 (Incorrect Default Permissions). Starting with Misskey version 2025.9.1, a configuration option 'trustProxy' was introduced to control whether the platform trusts the X-Forwarded-For header. However, before version 2025.12.0-alpha.2, this option defaults to an insecure value (true), meaning the platform trusts the header by default, leaving it vulnerable if the administrator does not explicitly set 'trustProxy' to false. The vulnerability is patched in version 2025.12.0-alpha.2 by changing the default of 'trustProxy' to false, thereby not trusting the header unless explicitly configured. Users behind a properly configured trusted reverse proxy are not affected, as the proxy correctly manages client IPs. No known exploits are reported in the wild yet. The CVSS 4.0 score is 6.9 (medium), reflecting network attack vector, no privileges or user interaction required, and partial impact on confidentiality and availability due to potential brute-force attacks.
Potential Impact
For European organizations using Misskey versions between 2025.9.1 and 2025.11.1 without proper configuration, this vulnerability can allow attackers to bypass IP-based rate limiting on authentication attempts. This can lead to increased risk of brute-force or credential stuffing attacks, potentially resulting in unauthorized account access, data exposure, and reputational damage. Since Misskey is a federated social media platform, compromised accounts could be used to spread misinformation or malicious content, impacting trust and platform integrity. Additionally, excessive authentication attempts could degrade service availability due to resource exhaustion. Organizations relying on Misskey for internal or community communication may face operational disruptions. The impact is mitigated for those using trusted reverse proxies correctly configured or running patched versions. However, the federated nature of Misskey means that vulnerabilities in one instance can have cascading effects across the network, increasing the importance of timely mitigation in Europe where federated social media adoption is growing.
Mitigation Recommendations
European organizations should immediately verify their Misskey deployment version and configuration. If running versions from 2025.9.1 to before 2025.12.0-alpha.2, they must set 'trustProxy: false' explicitly in the configuration file unless they are certain their reverse proxy is trusted and correctly configured. Upgrading to version 2025.12.0-alpha.2 or later is strongly recommended to benefit from the secure default. Organizations should audit their reverse proxy setups to ensure they are trusted and properly forwarding client IPs without allowing header forgery. Implement additional multi-factor authentication (MFA) to reduce the risk of account compromise from brute-force attacks. Monitoring authentication logs for unusual patterns of failed attempts can help detect exploitation attempts early. Network-level rate limiting and Web Application Firewalls (WAFs) can provide additional layers of defense. Finally, educating administrators about the importance of correct 'trustProxy' configuration and maintaining up-to-date software is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Belgium, Switzerland
CVE-2025-66482: CWE-307: Improper Restriction of Excessive Authentication Attempts in misskey-dev misskey
Description
Misskey is an open source, federated social media platform. Attackers who use an untrusted reverse proxy or not using a reverse proxy at all can bypass IP rate limiting by adding a forged X-Forwarded-For header. Starting with version 2025.9.1, an option (`trustProxy`) has been added in config file to prevent this from happening. However, it is initialized with an insecure default value before version 2025.12.0-alpha.2, making it still vulnerable if the configuration is not set correctly. This is patched in v2025.12.0-alpha.2 by flipping default value of `trustProxy` to `false`. Users of a trusted reverse proxy who are unsure if they manually overode this value should check their config for optimal behavior. Users are running Misskey with a trusted reverse proxy should not be affected by this vulnerability. From v2025.9.1 to v2025.11.1, workaround is available. Set `trustProxy: false` in config file.
AI-Powered Analysis
Technical Analysis
Misskey is an open-source federated social media platform that implements IP-based rate limiting to prevent excessive authentication attempts, a common defense against brute-force attacks. CVE-2025-66482 arises from improper handling of the X-Forwarded-For HTTP header, which is used to identify the originating IP address of a client connecting through a reverse proxy. If an attacker controls or uses an untrusted reverse proxy or no proxy at all, they can forge this header to bypass IP rate limiting, effectively circumventing protections designed to limit authentication attempts per IP. This vulnerability is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-1188 (Incorrect Default Permissions). Starting with Misskey version 2025.9.1, a configuration option 'trustProxy' was introduced to control whether the platform trusts the X-Forwarded-For header. However, before version 2025.12.0-alpha.2, this option defaults to an insecure value (true), meaning the platform trusts the header by default, leaving it vulnerable if the administrator does not explicitly set 'trustProxy' to false. The vulnerability is patched in version 2025.12.0-alpha.2 by changing the default of 'trustProxy' to false, thereby not trusting the header unless explicitly configured. Users behind a properly configured trusted reverse proxy are not affected, as the proxy correctly manages client IPs. No known exploits are reported in the wild yet. The CVSS 4.0 score is 6.9 (medium), reflecting network attack vector, no privileges or user interaction required, and partial impact on confidentiality and availability due to potential brute-force attacks.
Potential Impact
For European organizations using Misskey versions between 2025.9.1 and 2025.11.1 without proper configuration, this vulnerability can allow attackers to bypass IP-based rate limiting on authentication attempts. This can lead to increased risk of brute-force or credential stuffing attacks, potentially resulting in unauthorized account access, data exposure, and reputational damage. Since Misskey is a federated social media platform, compromised accounts could be used to spread misinformation or malicious content, impacting trust and platform integrity. Additionally, excessive authentication attempts could degrade service availability due to resource exhaustion. Organizations relying on Misskey for internal or community communication may face operational disruptions. The impact is mitigated for those using trusted reverse proxies correctly configured or running patched versions. However, the federated nature of Misskey means that vulnerabilities in one instance can have cascading effects across the network, increasing the importance of timely mitigation in Europe where federated social media adoption is growing.
Mitigation Recommendations
European organizations should immediately verify their Misskey deployment version and configuration. If running versions from 2025.9.1 to before 2025.12.0-alpha.2, they must set 'trustProxy: false' explicitly in the configuration file unless they are certain their reverse proxy is trusted and correctly configured. Upgrading to version 2025.12.0-alpha.2 or later is strongly recommended to benefit from the secure default. Organizations should audit their reverse proxy setups to ensure they are trusted and properly forwarding client IPs without allowing header forgery. Implement additional multi-factor authentication (MFA) to reduce the risk of account compromise from brute-force attacks. Monitoring authentication logs for unusual patterns of failed attempts can help detect exploitation attempts early. Network-level rate limiting and Web Application Firewalls (WAFs) can provide additional layers of defense. Finally, educating administrators about the importance of correct 'trustProxy' configuration and maintaining up-to-date software is critical.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-02T17:09:52.016Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69409a3bd9bcdf3f3d093948
Added to database: 12/15/2025, 11:31:07 PM
Last enriched: 12/23/2025, 12:20:42 AM
Last updated: 2/7/2026, 8:43:49 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
MediumCVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.