Vulnerability Description
A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-Forwarded-For HTTP headers. This can enable attackers to perform DoS attacks or brute force share codes.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lanol | Filecodebox | <= 2.2 |
Related Weaknesses (CWE)
References
- https://github.com/vastsa/FileCodeBoxProduct
- https://github.com/vastsa/FileCodeBox/issues/350ExploitIssue Tracking
FAQ
What is CVE-2025-51663?
CVE-2025-51663 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability found in IPRateLimit implementation of FileCodeBox up to 2.2 allows remote attackers to bypass ip-based rate limit protection and failed attempt restrictions by faking X-Real-IP and X-...
How severe is CVE-2025-51663?
CVE-2025-51663 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-51663?
Check the references section above for vendor advisories and patch information. Affected products include: Lanol Filecodebox.