MyTube is a self-hosted downloader and player for several video websites. Prior to version 1.7.71, a rate limiting bypass via `X-Forwarded-For` header spoofing allows unauthenticated attackers to bypass IP-based rate limiting on general API endpoints. Attackers can spoof client IPs by manipulating the `X-Forwarded-For` header, enabling unlimited requests to protected endpoints, including general API endpoints (enabling DoS) and other rate-limited functionality. Version 1.7.71 contains a patch for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/franklioxygen/MyTube/commit/bc057458804ae7ac70ea00605680512ed3d4257b | Patch |
| https://github.com/franklioxygen/MyTube/security/advisories/GHSA-59gr-529g-x45h | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-19 21:15
Updated : 2026-02-02 13:27
NVD link : CVE-2026-23848
Mitre link : CVE-2026-23848
CVE.ORG link : CVE-2026-23848
JSON object : View
Products Affected
franklioxygen
- mytube
CWE
CWE-807
Reliance on Untrusted Inputs in a Security Decision
