Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35436: CWE-248 Uncaught Exception in CISA Thorium

0
Medium
VulnerabilityCVE-2025-35436cvecve-2025-35436cwe-248
Published: Wed Sep 17 2025 (09/17/2025, 16:53:47 UTC)
Source: CVE Database V5
Vendor/Project: CISA
Product: Thorium

Description

CISA Thorium uses '.unwrap()' to handle errors related to account verification email messages. An unauthenticated remote attacker could cause a crash by providing a specially crafted email address or response. Fixed in commit 6a65a27.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:17:17 UTC

Technical Analysis

CVE-2025-35436 is a medium-severity vulnerability affecting version 1.0.0 of the CISA Thorium product. The root cause is an uncaught exception (CWE-248) triggered by the use of the Rust '.unwrap()' method in the code handling account verification email messages. Specifically, when processing these email messages, the application expects valid input and uses '.unwrap()' to extract values without proper error handling. An unauthenticated remote attacker can exploit this by submitting a specially crafted email address or response that causes the '.unwrap()' call to fail, leading to an unhandled exception and a crash of the Thorium service. This results in a denial of service (DoS) condition, impacting availability but not confidentiality or integrity. The vulnerability does not require any authentication or user interaction and can be triggered remotely over the network. The issue has been fixed in a later commit (6a65a27), but no official patch link is provided in the data. No known exploits are reported in the wild as of now. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability only. This vulnerability highlights the risks of improper error handling in Rust applications, especially when using '.unwrap()' without safeguards in input processing paths.

Potential Impact

For European organizations using CISA Thorium version 1.0.0, this vulnerability poses a risk of service disruption due to crashes triggered by unauthenticated remote attackers. The impact is primarily on availability, potentially causing denial of service conditions that could interrupt critical workflows involving account verification processes. While the vulnerability does not expose sensitive data or allow unauthorized data modification, the downtime or instability could affect operational continuity, user trust, and compliance with service availability requirements under regulations such as the EU's NIS2 Directive. Organizations relying on Thorium for security or infrastructure management may face increased risk of operational disruption, especially if the service is internet-facing or exposed to untrusted networks. The lack of required authentication and ease of exploitation increase the likelihood of opportunistic attacks, although no active exploitation is currently known.

Mitigation Recommendations

European organizations should immediately verify if they are running CISA Thorium version 1.0.0 and plan to upgrade to the fixed version containing commit 6a65a27 or later. In the absence of an official patch, temporary mitigations include implementing network-level protections such as firewall rules or web application firewalls (WAFs) to restrict or filter suspicious inputs targeting the account verification email handling endpoints. Monitoring logs for unusual or malformed email address inputs can help detect attempted exploitation. Additionally, organizations should review their Rust codebases for unsafe use of '.unwrap()' or similar error handling anti-patterns and adopt more robust error handling practices, such as using 'match' statements or 'expect()' with clear error messages. Conducting thorough input validation and sanitization on all external inputs is critical. Finally, ensure that incident response plans include procedures for quickly restarting or restoring the Thorium service in case of crashes to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:57:14.281Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cae909b253b63d00f0f6e5

Added to database: 9/17/2025, 4:59:53 PM

Last enriched: 10/1/2025, 12:17:17 AM

Last updated: 10/30/2025, 12:54:38 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats