CVE-2026-23848: CWE-807: Reliance on Untrusted Inputs in a Security Decision in franklioxygen MyTube
CVE-2026-23848 is a medium severity vulnerability in franklioxygen's MyTube versions prior to 1. 7. 71. It allows unauthenticated attackers to bypass IP-based rate limiting by spoofing the X-Forwarded-For header, enabling unlimited requests to API endpoints. This can lead to denial-of-service conditions and abuse of rate-limited functionality. The vulnerability arises from reliance on untrusted input for security decisions (CWE-807). No authentication or user interaction is required, and the vulnerability affects availability primarily, with limited confidentiality impact. A patch was released in version 1. 7. 71 to address this issue.
AI Analysis
Technical Summary
CVE-2026-23848 is a vulnerability identified in the MyTube application, a self-hosted video downloader and player supporting multiple video websites. The flaw exists in versions prior to 1.7.71 and involves improper reliance on the X-Forwarded-For HTTP header for enforcing IP-based rate limiting on API endpoints. Attackers can spoof this header to impersonate arbitrary client IP addresses, thereby bypassing rate limits designed to restrict the number of requests from a single IP. This allows unauthenticated attackers to send unlimited requests to protected API endpoints, potentially overwhelming the service and causing denial-of-service (DoS) conditions. The vulnerability is classified under CWE-807, indicating reliance on untrusted inputs in security decisions. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact but low integrity and availability impact. The patch in version 1.7.71 corrects this by properly validating or ignoring the X-Forwarded-For header for rate limiting purposes. No known exploits are currently reported in the wild. The vulnerability primarily threatens availability by enabling DoS attacks and could facilitate abuse of rate-limited features, potentially impacting service stability and user experience.
Potential Impact
For European organizations using MyTube versions prior to 1.7.71, this vulnerability poses a risk of denial-of-service attacks that can disrupt access to video downloading and playback services. This could affect internal workflows relying on MyTube for media consumption or content processing, especially in media companies, educational institutions, or enterprises with self-hosted media solutions. The ability to bypass rate limits without authentication increases the risk of automated abuse, potentially leading to service outages or degraded performance. While confidentiality and integrity impacts are limited, availability disruptions could affect business continuity and user satisfaction. Organizations operating in sectors where video content delivery is critical may face operational and reputational damage. Additionally, if MyTube is exposed to the internet, attackers could exploit this vulnerability remotely without authentication, increasing the attack surface. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should immediately upgrade MyTube installations to version 1.7.71 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement network-level controls to validate or strip the X-Forwarded-For header from incoming requests before they reach MyTube, ensuring that spoofed headers cannot influence rate limiting. Deploy Web Application Firewalls (WAFs) or reverse proxies configured to enforce rate limiting based on trusted client IPs or other reliable identifiers rather than headers that can be spoofed. Monitor API usage patterns for unusual spikes in request rates that may indicate exploitation attempts. Restrict access to MyTube API endpoints to trusted networks or VPNs where possible to reduce exposure. Conduct regular security audits and penetration tests focusing on header manipulation and rate limiting controls. Maintain up-to-date incident response plans to quickly address potential DoS attacks. Finally, educate administrators about the risks of trusting client-supplied headers for security decisions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-23848: CWE-807: Reliance on Untrusted Inputs in a Security Decision in franklioxygen MyTube
Description
CVE-2026-23848 is a medium severity vulnerability in franklioxygen's MyTube versions prior to 1. 7. 71. It allows unauthenticated attackers to bypass IP-based rate limiting by spoofing the X-Forwarded-For header, enabling unlimited requests to API endpoints. This can lead to denial-of-service conditions and abuse of rate-limited functionality. The vulnerability arises from reliance on untrusted input for security decisions (CWE-807). No authentication or user interaction is required, and the vulnerability affects availability primarily, with limited confidentiality impact. A patch was released in version 1. 7. 71 to address this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-23848 is a vulnerability identified in the MyTube application, a self-hosted video downloader and player supporting multiple video websites. The flaw exists in versions prior to 1.7.71 and involves improper reliance on the X-Forwarded-For HTTP header for enforcing IP-based rate limiting on API endpoints. Attackers can spoof this header to impersonate arbitrary client IP addresses, thereby bypassing rate limits designed to restrict the number of requests from a single IP. This allows unauthenticated attackers to send unlimited requests to protected API endpoints, potentially overwhelming the service and causing denial-of-service (DoS) conditions. The vulnerability is classified under CWE-807, indicating reliance on untrusted inputs in security decisions. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact but low integrity and availability impact. The patch in version 1.7.71 corrects this by properly validating or ignoring the X-Forwarded-For header for rate limiting purposes. No known exploits are currently reported in the wild. The vulnerability primarily threatens availability by enabling DoS attacks and could facilitate abuse of rate-limited features, potentially impacting service stability and user experience.
Potential Impact
For European organizations using MyTube versions prior to 1.7.71, this vulnerability poses a risk of denial-of-service attacks that can disrupt access to video downloading and playback services. This could affect internal workflows relying on MyTube for media consumption or content processing, especially in media companies, educational institutions, or enterprises with self-hosted media solutions. The ability to bypass rate limits without authentication increases the risk of automated abuse, potentially leading to service outages or degraded performance. While confidentiality and integrity impacts are limited, availability disruptions could affect business continuity and user satisfaction. Organizations operating in sectors where video content delivery is critical may face operational and reputational damage. Additionally, if MyTube is exposed to the internet, attackers could exploit this vulnerability remotely without authentication, increasing the attack surface. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
European organizations should immediately upgrade MyTube installations to version 1.7.71 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement network-level controls to validate or strip the X-Forwarded-For header from incoming requests before they reach MyTube, ensuring that spoofed headers cannot influence rate limiting. Deploy Web Application Firewalls (WAFs) or reverse proxies configured to enforce rate limiting based on trusted client IPs or other reliable identifiers rather than headers that can be spoofed. Monitor API usage patterns for unusual spikes in request rates that may indicate exploitation attempts. Restrict access to MyTube API endpoints to trusted networks or VPNs where possible to reduce exposure. Conduct regular security audits and penetration tests focusing on header manipulation and rate limiting controls. Maintain up-to-date incident response plans to quickly address potential DoS attacks. Finally, educate administrators about the risks of trusting client-supplied headers for security decisions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T15:46:40.843Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696e99304623b1157cce4b19
Added to database: 1/19/2026, 8:50:56 PM
Last enriched: 1/27/2026, 8:23:19 PM
Last updated: 2/6/2026, 9:29:32 PM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2067: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25581: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samclarke SCEditor
MediumCVE-2026-25580: CWE-918: Server-Side Request Forgery (SSRF) in pydantic pydantic-ai
HighCVE-2026-25631: CWE-20: Improper Input Validation in n8n-io n8n
MediumCVE-2026-25592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in microsoft semantic-kernel
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.