CVE-2025-35432: CWE-400 Uncontrolled Resource Consumption in CISA Thorium
CISA Thorium does not rate limit requests to send account verification email messages. A remote unauthenticated attacker can send unlimited messages to a user who is pending verification. Fixed in 1.1.1 by adding a rate limit set by default to 10 minutes.
AI Analysis
Technical Summary
CVE-2025-35432 is a medium-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the CISA Thorium product, specifically version 1.0.0. The vulnerability arises because the application does not implement rate limiting on requests to send account verification email messages. This flaw allows a remote, unauthenticated attacker to trigger an unlimited number of verification emails to be sent to a user account that is pending verification. The absence of rate limiting means that an attacker can abuse this functionality to cause resource exhaustion on the email sending infrastructure or the application itself, potentially leading to denial of service conditions or email service degradation. The vulnerability does not impact confidentiality or integrity directly but affects availability by enabling resource consumption attacks. The issue was addressed in version 1.1.1 by introducing a default rate limit of one verification email every 10 minutes per user, effectively mitigating the risk of abuse. The CVSS v3.1 score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using CISA Thorium version 1.0.0, this vulnerability could lead to service disruptions due to resource exhaustion caused by excessive email verification requests. This could degrade user experience, delay legitimate account verification processes, and potentially overload email infrastructure, increasing operational costs and impacting service availability. While the vulnerability does not expose sensitive data or allow unauthorized access, the denial of service aspect could be exploited by attackers to disrupt onboarding or user verification workflows, which are critical for identity and access management. Organizations relying on Thorium for user verification should be aware that attackers do not need authentication or user interaction to exploit this flaw, increasing the risk of automated abuse. The impact is particularly relevant for sectors with high user registration volumes or strict availability requirements, such as financial services, government portals, and critical infrastructure operators in Europe.
Mitigation Recommendations
European organizations should immediately upgrade CISA Thorium to version 1.1.1 or later, where the rate limiting fix is implemented by default. If upgrading is not immediately feasible, organizations should implement compensating controls such as external rate limiting on the email verification endpoint via web application firewalls or API gateways. Monitoring and alerting on unusual spikes in verification email requests can help detect exploitation attempts early. Additionally, organizations should review their email infrastructure capacity and implement throttling or queuing mechanisms to prevent service degradation. Incorporating CAPTCHA or other bot mitigation techniques on the verification request interface can further reduce automated abuse. Finally, organizations should audit user accounts pending verification and consider temporary manual verification processes if abuse is detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-35432: CWE-400 Uncontrolled Resource Consumption in CISA Thorium
Description
CISA Thorium does not rate limit requests to send account verification email messages. A remote unauthenticated attacker can send unlimited messages to a user who is pending verification. Fixed in 1.1.1 by adding a rate limit set by default to 10 minutes.
AI-Powered Analysis
Technical Analysis
CVE-2025-35432 is a medium-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the CISA Thorium product, specifically version 1.0.0. The vulnerability arises because the application does not implement rate limiting on requests to send account verification email messages. This flaw allows a remote, unauthenticated attacker to trigger an unlimited number of verification emails to be sent to a user account that is pending verification. The absence of rate limiting means that an attacker can abuse this functionality to cause resource exhaustion on the email sending infrastructure or the application itself, potentially leading to denial of service conditions or email service degradation. The vulnerability does not impact confidentiality or integrity directly but affects availability by enabling resource consumption attacks. The issue was addressed in version 1.1.1 by introducing a default rate limit of one verification email every 10 minutes per user, effectively mitigating the risk of abuse. The CVSS v3.1 score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using CISA Thorium version 1.0.0, this vulnerability could lead to service disruptions due to resource exhaustion caused by excessive email verification requests. This could degrade user experience, delay legitimate account verification processes, and potentially overload email infrastructure, increasing operational costs and impacting service availability. While the vulnerability does not expose sensitive data or allow unauthorized access, the denial of service aspect could be exploited by attackers to disrupt onboarding or user verification workflows, which are critical for identity and access management. Organizations relying on Thorium for user verification should be aware that attackers do not need authentication or user interaction to exploit this flaw, increasing the risk of automated abuse. The impact is particularly relevant for sectors with high user registration volumes or strict availability requirements, such as financial services, government portals, and critical infrastructure operators in Europe.
Mitigation Recommendations
European organizations should immediately upgrade CISA Thorium to version 1.1.1 or later, where the rate limiting fix is implemented by default. If upgrading is not immediately feasible, organizations should implement compensating controls such as external rate limiting on the email verification endpoint via web application firewalls or API gateways. Monitoring and alerting on unusual spikes in verification email requests can help detect exploitation attempts early. Additionally, organizations should review their email infrastructure capacity and implement throttling or queuing mechanisms to prevent service degradation. Incorporating CAPTCHA or other bot mitigation techniques on the verification request interface can further reduce automated abuse. Finally, organizations should audit user accounts pending verification and consider temporary manual verification processes if abuse is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:57:14.280Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cae909b253b63d00f0f6ce
Added to database: 9/17/2025, 4:59:53 PM
Last enriched: 9/17/2025, 5:01:06 PM
Last updated: 9/19/2025, 5:38:41 AM
Views: 13
Related Threats
CVE-2025-7403: Write-what-where Condition in zephyrproject-rtos Zephyr
HighCVE-2025-10458: Improper Handling of Length Parameter Inconsistency in zephyrproject-rtos Zephyr
HighCVE-2025-10457: Improperly Implemented Security Check for Standard in zephyrproject-rtos Zephyr
MediumCVE-2025-8487: CWE-862 Missing Authorization in extendthemes Kubio AI Page Builder
MediumCVE-2025-59717: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in DigitalOcean @digitalocean/do-markdownit
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.