{"id":"CVE-2025-51663","details":"A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.","modified":"2025-11-26T09:09:34.035539Z","published":"2025-11-19T20:15:53.203Z","references":[{"type":"EVIDENCE","url":"https://github.com/vastsa/FileCodeBox/issues/350"},{"type":"PACKAGE","url":"https://github.com/vastsa/FileCodeBox"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vastsa/filecodebox","events":[{"introduced":"0"},{"last_affected":"17331112b43c1d97256e2d8e7e16d76e3b0a3b60"}]}],"versions":["2.2","Main","V1.1","V1.2","V1.4","V1.4.1","V1.4.3","V1.4.4","V1.4.5","V1.5.1","V1.5.2","V1.5.3","V1.5.4","V1.5.6","V1.5.7","V1.5.9","V1.5.9.1","V1.5.9.2","V1.6","V1.7Beta","V2.0","V2.1","latest"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-51663.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}