Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27981: CWE-307: Improper Restriction of Excessive Authentication Attempts in sysadminsmedia homebox

0
High
VulnerabilityCVE-2026-27981cvecve-2026-27981cwe-307
Published: Tue Mar 03 2026 (03/03/2026, 22:27:37 UTC)
Source: CVE Database V5
Vendor/Project: sysadminsmedia
Product: homebox

Description

HomeBox is a home inventory and organization system. Prior to 0.24.0, the authentication rate limiter (authRateLimiter) tracks failed attempts per client IP. It determines the client IP by reading, 1. X-Real-IP header, 2. First entry of X-Forwarded-For header, and 3. r.RemoteAddr (TCP connection address). These headers were read unconditionally. An attacker connecting directly to Homebox could forge any value in X-Real-IP, effectively getting a fresh rate limit identity per request. There is a TrustProxy option in the configuration (Options.TrustProxy, default false), but this option was never read by any middleware or rate limiter code. Additionally, chi's middleware.RealIP was applied unconditionally in main.go, overwriting r.RemoteAddr with the forged header value before it reaches any handler. This vulnerability is fixed in 0.24.0.

AI-Powered Analysis

AILast updated: 03/03/2026, 23:02:54 UTC

Technical Analysis

CVE-2026-27981 is a vulnerability classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) affecting sysadminsmedia's HomeBox software prior to version 0.24.0. HomeBox implements an authentication rate limiter (authRateLimiter) designed to track failed login attempts per client IP to prevent brute-force attacks. The mechanism determines the client IP by unconditionally reading the X-Real-IP header, the first entry in the X-Forwarded-For header, and finally the TCP connection address (r.RemoteAddr). However, these headers can be easily forged by an attacker connecting directly to the HomeBox server. The TrustProxy option, which should control whether proxy headers are trusted, is set to false by default but is never actually checked or enforced by the rate limiter or any middleware. Moreover, the chi middleware RealIP is applied unconditionally in main.go, which overwrites r.RemoteAddr with the potentially forged header value before any handler processes the request. This means an attacker can supply arbitrary IP addresses in headers, effectively resetting their rate limit identity on every request and bypassing the rate limiting protections. This vulnerability allows an unauthenticated attacker to perform unlimited brute-force authentication attempts, potentially compromising user credentials and system integrity. The vulnerability was fixed in version 0.24.0 by correcting the handling of proxy headers and enforcing the TrustProxy configuration. The CVSS 3.1 score is 7.4, reflecting network attack vector, high impact on confidentiality and integrity, no privileges required, no user interaction, and high attack complexity.

Potential Impact

The primary impact of this vulnerability is that attackers can bypass authentication rate limiting by forging client IP headers, enabling unlimited brute-force login attempts against HomeBox instances. This can lead to credential compromise, unauthorized access, and potential data breaches affecting user confidentiality and system integrity. Since HomeBox is a home inventory and organization system, compromised accounts could expose sensitive personal or household data. The vulnerability does not directly affect availability but undermines authentication controls, increasing the risk of account takeover. Organizations running vulnerable versions face elevated risk of automated attacks and credential stuffing campaigns. The lack of proper proxy header validation also indicates potential misconfigurations in deployment environments, which could be exploited further. Although no known exploits are reported in the wild yet, the ease of exploitation and high impact warrant urgent remediation to prevent future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade HomeBox to version 0.24.0 or later, where the issue is fixed. If upgrading is not immediately possible, administrators should disable or restrict access to the HomeBox service from untrusted networks to limit exposure. Review and correctly configure the TrustProxy option to ensure that only trusted proxy headers are accepted and processed. Implement additional network-level protections such as Web Application Firewalls (WAFs) or rate limiting at the perimeter to detect and block suspicious authentication attempts. Monitor authentication logs for unusual patterns indicative of brute-force attacks. Consider deploying multi-factor authentication (MFA) to reduce the risk of compromised credentials leading to unauthorized access. Finally, audit all middleware and proxy configurations to ensure that client IP addresses used for security controls are reliably sourced and validated.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.794Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a76534d1a09e29cb81f9b4

Added to database: 3/3/2026, 10:48:20 PM

Last enriched: 3/3/2026, 11:02:54 PM

Last updated: 3/4/2026, 7:18:00 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses