Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27981— HomeBox has an Auth Rate Limit Bypass via IP Spoofing

CVSS 7.4 · High EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27981

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
HomeBox has an Auth Rate Limit Bypass via IP Spoofing
Source: NVD (National Vulnerability Database)
Vulnerability Description
HomeBox is a home inventory and organization system. Prior to 0.24.0, the authentication rate limiter (authRateLimiter) tracks failed attempts per client IP. It determines the client IP by reading, 1. X-Real-IP header, 2. First entry of X-Forwarded-For header, and 3. r.RemoteAddr (TCP connection address). These headers were read unconditionally. An attacker connecting directly to Homebox could forge any value in X-Real-IP, effectively getting a fresh rate limit identity per request. There is a TrustProxy option in the configuration (Options.TrustProxy, default false), but this option was never read by any middleware or rate limiter code. Additionally, chi's middleware.RealIP was applied unconditionally in main.go, overwriting r.RemoteAddr with the forged header value before it reaches any handler. This vulnerability is fixed in 0.24.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
过多认证尝试的限制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
HomeBox 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
HomeBox是SysAdmins Media开源的一个为家庭用户构建的库存和组织系统。 HomeBox 0.24.0之前版本存在安全漏洞,该漏洞源于身份验证速率限制器无条件读取并信任X-Real-IP等标头,且配置选项未生效,可能导致攻击者绕过速率限制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
sysadminsmediahomebox < 0.24.0 -

II. Public POCs for CVE-2026-27981

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27981

登录查看更多情报信息。

Same Patch Batch · sysadminsmedia · 2026-03-03 · 3 CVEs total

CVE-2026-276005.0 MEDIUMHomeBox affected by Blind SSRF
CVE-2026-262724.6 MEDIUMHomeBox affected by Stored XSS via HTML/SVG Attachment Upload

IV. Related Vulnerabilities

V. Comments for CVE-2026-27981

No comments yet


Leave a comment