CVE-2026-33935: CWE-307: Improper Restriction of Excessive Authentication Attempts in franklioxygen MyTube
CVE-2026-33935 affects franklioxygen MyTube versions prior to 1. 8. 72. It allows an unauthenticated attacker to cause a denial of service by locking out administrator and visitor accounts from password-based authentication. The vulnerability arises because three publicly accessible password verification endpoints share a single file-backed login attempt state, which tracks failed attempts and cooldown periods globally. An attacker can repeatedly trigger failed login attempts to progressively increase the lockout duration up to 24 hours, effectively preventing legitimate users from logging in. The lockout can be maintained indefinitely by continuing this pattern. Version 1. 8. 72 addresses this issue.
AI Analysis
Technical Summary
MyTube prior to version 1.8.72 has an improper restriction of excessive authentication attempts (CWE-307). The application exposes three password verification endpoints that share a single file-based login attempt state stored in 'login-attempts.json'. Failed login attempts on any endpoint increment a shared counter and trigger cooldown periods that block further attempts before password verification. An attacker can exploit this by sending repeated invalid authentication requests to any endpoint, causing the shared failed attempt counter to increase and the cooldown period to extend progressively up to 24 hours. This results in a denial of service by locking out legitimate users from authenticating. The vulnerability is fixed in version 1.8.72.
Potential Impact
An unauthenticated attacker can cause a denial of service by locking out all users from password-based authentication for up to 24 hours or indefinitely by maintaining the attack. This affects both administrator and visitor accounts, preventing legitimate access to the application until the cooldown expires or the lockout is reset. There is no indication of data compromise or privilege escalation, but the availability of authentication is impacted.
Mitigation Recommendations
Upgrade MyTube to version 1.8.72 or later, where this vulnerability is fixed. There is no indication of alternative mitigations or temporary workarounds. Patch status is confirmed by the vendor's versioning information.
CVE-2026-33935: CWE-307: Improper Restriction of Excessive Authentication Attempts in franklioxygen MyTube
Description
CVE-2026-33935 affects franklioxygen MyTube versions prior to 1. 8. 72. It allows an unauthenticated attacker to cause a denial of service by locking out administrator and visitor accounts from password-based authentication. The vulnerability arises because three publicly accessible password verification endpoints share a single file-backed login attempt state, which tracks failed attempts and cooldown periods globally. An attacker can repeatedly trigger failed login attempts to progressively increase the lockout duration up to 24 hours, effectively preventing legitimate users from logging in. The lockout can be maintained indefinitely by continuing this pattern. Version 1. 8. 72 addresses this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
MyTube prior to version 1.8.72 has an improper restriction of excessive authentication attempts (CWE-307). The application exposes three password verification endpoints that share a single file-based login attempt state stored in 'login-attempts.json'. Failed login attempts on any endpoint increment a shared counter and trigger cooldown periods that block further attempts before password verification. An attacker can exploit this by sending repeated invalid authentication requests to any endpoint, causing the shared failed attempt counter to increase and the cooldown period to extend progressively up to 24 hours. This results in a denial of service by locking out legitimate users from authenticating. The vulnerability is fixed in version 1.8.72.
Potential Impact
An unauthenticated attacker can cause a denial of service by locking out all users from password-based authentication for up to 24 hours or indefinitely by maintaining the attack. This affects both administrator and visitor accounts, preventing legitimate access to the application until the cooldown expires or the lockout is reset. There is no indication of data compromise or privilege escalation, but the availability of authentication is impacted.
Mitigation Recommendations
Upgrade MyTube to version 1.8.72 or later, where this vulnerability is fixed. There is no indication of alternative mitigations or temporary workarounds. Patch status is confirmed by the vendor's versioning information.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-24T19:50:52.103Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c5da053c064ed76f01c44a
Added to database: 3/27/2026, 1:14:45 AM
Last enriched: 4/3/2026, 1:32:54 PM
Last updated: 5/11/2026, 5:20:14 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.