Skip to main content

CVE-2025-35436: CWE-248 Uncaught Exception in CISA Thorium

Medium
VulnerabilityCVE-2025-35436cvecve-2025-35436cwe-248
Published: Wed Sep 17 2025 (09/17/2025, 16:53:47 UTC)
Source: CVE Database V5
Vendor/Project: CISA
Product: Thorium

Description

CISA Thorium uses '.unwrap()' to handle errors related to account verification email messages. An unauthenticated remote attacker could cause a crash by providing a specially crafted email address or response. Fixed in commit 6a65a27.

AI-Powered Analysis

AILast updated: 09/17/2025, 17:00:11 UTC

Technical Analysis

CVE-2025-35436 is a medium-severity vulnerability identified in the CISA Thorium product, specifically version 1.0.0. The root cause of the vulnerability lies in the improper error handling mechanism within the account verification email processing logic. The software uses the Rust programming language's '.unwrap()' method to handle errors related to email verification messages. The '.unwrap()' function in Rust will cause the program to panic and crash if it encounters an error instead of gracefully handling it. In this case, an unauthenticated remote attacker can exploit this flaw by sending a specially crafted email address or response that triggers the '.unwrap()' failure, causing the Thorium application to crash. This results in a denial of service (DoS) condition, impacting the availability of the service. The vulnerability is classified under CWE-248, which refers to uncaught exceptions leading to program crashes. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects availability only (A:L) without impacting confidentiality or integrity. No known exploits are currently reported in the wild, and the issue was fixed in a commit identified as 6a65a27. The vulnerability was publicly disclosed on September 17, 2025.

Potential Impact

For European organizations using CISA Thorium version 1.0.0, this vulnerability primarily poses a risk to service availability. An attacker could remotely cause the application to crash repeatedly, leading to denial of service conditions that disrupt normal operations. This could affect critical workflows that rely on account verification processes, potentially delaying user onboarding or authentication flows. While the vulnerability does not compromise confidentiality or integrity, the availability impact could be significant for organizations with high dependency on Thorium for security or operational tasks. In sectors such as government, critical infrastructure, or large enterprises where CISA Thorium might be deployed, repeated service interruptions could degrade trust and operational efficiency. However, since exploitation does not require authentication or user interaction, the attack surface is broad, increasing the likelihood of opportunistic attacks if the vulnerable version remains in use.

Mitigation Recommendations

European organizations should immediately verify their deployment of CISA Thorium and confirm the version in use. If version 1.0.0 is deployed, they should apply the patch containing commit 6a65a27 that fixes the uncaught exception issue. In the absence of an official patch, organizations can implement input validation and sanitization on email addresses and responses before they reach the '.unwrap()' call to prevent malformed inputs from triggering crashes. Additionally, configuring application-level monitoring and automated restarts can help mitigate availability impacts during an attack. Network-level protections such as rate limiting and filtering suspicious traffic targeting the email verification endpoints can reduce the risk of exploitation. Finally, organizations should conduct thorough testing of error handling paths in their Rust applications to prevent similar uncaught exceptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:57:14.281Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cae909b253b63d00f0f6e5

Added to database: 9/17/2025, 4:59:53 PM

Last enriched: 9/17/2025, 5:00:11 PM

Last updated: 9/17/2025, 5:00:39 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats