CVE-2025-35432
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-17

Last updated on: 2025-09-23

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
CISA Thorium does not rate limit requests to send account verification email messages. A remote unauthenticated attacker can send unlimited messages to a user who is pending verification. Fixed in 1.1.1 by adding a rate limit set by default to 10 minutes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-17
Last Modified
2025-09-23
Generated
2026-04-23
AI Q&A
2025-09-17
EPSS Evaluated
2026-04-22
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisa thorium 1.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in CISA Thorium allows a remote unauthenticated attacker to send unlimited account verification email messages to a user who is pending verification because the system does not rate limit these requests. This means an attacker can abuse the feature to send excessive emails until the issue is fixed. The problem was fixed in version 1.1.1 by adding a default rate limit of 10 minutes between such requests.


How can this vulnerability impact me? :

The vulnerability can lead to abuse where an attacker sends a large number of verification emails to a user, potentially causing email spam, annoyance, or denial of service to the user's email inbox. It may also increase resource usage on the server handling these requests. However, it does not directly impact confidentiality or integrity of data.


What immediate steps should I take to mitigate this vulnerability?

Upgrade CISA Thorium to version 1.1.1 or later, which includes a default rate limit of 10 minutes on sending account verification email messages to prevent abuse by remote unauthenticated attackers.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart