Cyber Posture

CVE-2025-66204

HighPublic PoC

Published: 09 December 2025

Published
09 December 2025
Modified
11 December 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66204 is a high-severity Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability in Wbce Wbce Cms. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Password Guessing (T1110.001); ranked at the 21.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-7 (Unsuccessful Logon Attempts) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Password Guessing (T1110.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces limits on consecutive unsuccessful logon attempts, directly preventing brute-force password guessing enabled by this CVE's bypass.

prevent

Requires validation of untrusted information inputs like the X-Forwarded-For header to block spoofing that resets brute-force counters.

prevent

Provides boundary protection to inspect and filter manipulated headers or enforce rate limiting independent of client IP claims at external interfaces.

MITRE ATT&CK Enterprise TechniquesAI

T1110.001 Password Guessing Credential Access
Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability bypasses brute-force protections via X-Forwarded-For header manipulation, directly enabling unlimited password guessing (T1110.001) on a public-facing CMS application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

WBCE CMS is a content management system. Version 1.6.4 contains a brute-force protection bypass where an attacker can indefinitely reset the counter by modifying `X-Forwarded-For` on each request, gaining unlimited password guessing attempts, effectively bypassing all brute-force protection. The application…

more

fully trusts the `X-Forwarded-For` header without validating it or restricting its usage. This issue is fixed in version 1.6.5.

Deeper analysisAI

WBCE CMS version 1.6.4, a content management system, is affected by CVE-2025-66204, a brute-force protection bypass vulnerability mapped to CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-693 (Protection Mechanism Failure). The flaw stems from the application's full trust in the X-Forwarded-For header without validation or restrictions, allowing attackers to reset the brute-force counter indefinitely by modifying this header on each request. This effectively disables all brute-force protections, enabling unlimited password guessing attempts.

The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating exploitation is possible over the network by unauthenticated remote attackers with no user interaction, though it requires high attack complexity. Attackers can achieve high impacts on confidentiality, integrity, and availability by bypassing rate limiting to brute-force credentials, potentially leading to unauthorized access to the CMS.

Mitigation is provided in WBCE CMS version 1.6.5, which addresses the issue. Security advisories detail the fix in GitHub advisory GHSA-f676-f375-m7mw, the release notes at github.com/WBCE/WBCE_CMS/releases/tag/1.6.5, and the specific commit 3765baddf27f31bbbea9c0228c452268621b25e5. Practitioners should upgrade immediately and review proxy configurations to avoid similar header trust issues.

Details

CWE(s)

Affected Products

wbce
wbce cms
≤ 1.6.5

CVEs Like This One

CVE-2022-50936Same product: Wbce Wbce Cms
CVE-2025-34506Same product: Wbce Wbce Cms
CVE-2024-58283Same product: Wbce Wbce Cms
CVE-2026-27981Shared CWE-307
CVE-2026-33152Shared CWE-307
CVE-2025-12995Shared CWE-307
CVE-2026-24436Shared CWE-307
CVE-2025-15422Shared CWE-693
CVE-2026-41316Shared CWE-693
CVE-2024-9342Shared CWE-307

References