๐Ÿ” CVE Alert

CVE-2026-27981

HIGH 7.4

HomeBox has an Auth Rate Limit Bypass via IP Spoofing

CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th

HomeBox is a home inventory and organization system. Prior to 0.24.0, the authentication rate limiter (authRateLimiter) tracks failed attempts per client IP. It determines the client IP by reading, 1. X-Real-IP header, 2. First entry of X-Forwarded-For header, and 3. r.RemoteAddr (TCP connection address). These headers were read unconditionally. An attacker connecting directly to Homebox could forge any value in X-Real-IP, effectively getting a fresh rate limit identity per request. There is a TrustProxy option in the configuration (Options.TrustProxy, default false), but this option was never read by any middleware or rate limiter code. Additionally, chi's middleware.RealIP was applied unconditionally in main.go, overwriting r.RemoteAddr with the forged header value before it reaches any handler. This vulnerability is fixed in 0.24.0.

CWE CWE-307
Vendor sysadminsmedia
Product homebox
Published Mar 3, 2026
Last Updated Mar 4, 2026
Stay Ahead of the Next One

Get instant alerts for sysadminsmedia homebox

Be the first to know when new high vulnerabilities affecting sysadminsmedia homebox are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

sysadminsmedia / homebox
< 0.24.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sysadminsmedia/homebox/security/advisories/GHSA-j86g-v96v-jpp3