CVE-2025-48375: CWE-770: Allocation of Resources Without Limits or Throttling in schule111 Schule
Schule is open-source school management system software. Prior to version 1.0.1, the file forgot_password.php (or equivalent endpoint responsible for email-based OTP generation) lacks proper rate limiting controls, allowing attackers to abuse the OTP request functionality. This vulnerability can be exploited to send an excessive number of OTP emails, leading to potential denial-of-service (DoS) conditions or facilitating user harassment through email flooding. Version 1.0.1 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-48375 is a medium-severity vulnerability affecting versions of the open-source school management system software Schule prior to 1.0.1. The vulnerability is classified under CWE-770, which pertains to the allocation of resources without limits or throttling. Specifically, the issue resides in the forgot_password.php endpoint (or its equivalent responsible for generating email-based one-time passwords, OTPs). This endpoint lacks proper rate limiting controls, allowing an unauthenticated attacker to repeatedly trigger OTP email generation without restriction. As a result, an attacker can abuse this functionality to send an excessive volume of OTP emails to targeted users. The consequences include potential denial-of-service (DoS) conditions on the email infrastructure or the Schule application itself due to resource exhaustion. Additionally, this can facilitate user harassment through email flooding, potentially impacting user trust and system reputation. The vulnerability does not require authentication or user interaction, making exploitation straightforward over the network. The issue was addressed and fixed in version 1.0.1 of Schule by implementing appropriate rate limiting controls on the OTP request functionality. The CVSS 4.0 base score is 6.6 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, no impact on confidentiality, integrity, or availability directly, but high impact on availability through resource exhaustion. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using Schule as their school management system, this vulnerability poses a risk primarily to service availability and user experience. Exploitation can lead to denial-of-service conditions by overwhelming the email system or the Schule application with excessive OTP requests, potentially disrupting password recovery workflows and other dependent services. This disruption can affect students, teachers, and administrative staff, impeding critical educational operations. Furthermore, the ability to flood users with OTP emails can cause harassment and reduce user confidence in the platform's security. Given the sensitive nature of educational data and the reliance on digital platforms in European schools, such disruptions could have cascading effects on educational continuity and compliance with data protection regulations like GDPR if user contact information is abused. However, since the vulnerability does not allow direct data compromise or privilege escalation, the confidentiality and integrity of data remain intact if exploited solely through this vector.
Mitigation Recommendations
European organizations should immediately upgrade Schule installations to version 1.0.1 or later, where the vulnerability is patched with proper rate limiting controls. Until upgrade is possible, administrators can implement temporary mitigations such as deploying web application firewalls (WAFs) or reverse proxies configured to detect and throttle excessive OTP requests from single IP addresses or user accounts. Monitoring email sending patterns and setting thresholds for OTP email generation can help detect abuse early. Additionally, implementing CAPTCHA challenges on the OTP request form can reduce automated abuse. Organizations should also review email infrastructure capacity and alerting to handle potential spikes in email traffic. Educating users about potential phishing or harassment attempts related to OTP flooding is advisable. Finally, maintaining up-to-date backups and incident response plans will help mitigate any operational disruptions caused by exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-48375: CWE-770: Allocation of Resources Without Limits or Throttling in schule111 Schule
Description
Schule is open-source school management system software. Prior to version 1.0.1, the file forgot_password.php (or equivalent endpoint responsible for email-based OTP generation) lacks proper rate limiting controls, allowing attackers to abuse the OTP request functionality. This vulnerability can be exploited to send an excessive number of OTP emails, leading to potential denial-of-service (DoS) conditions or facilitating user harassment through email flooding. Version 1.0.1 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-48375 is a medium-severity vulnerability affecting versions of the open-source school management system software Schule prior to 1.0.1. The vulnerability is classified under CWE-770, which pertains to the allocation of resources without limits or throttling. Specifically, the issue resides in the forgot_password.php endpoint (or its equivalent responsible for generating email-based one-time passwords, OTPs). This endpoint lacks proper rate limiting controls, allowing an unauthenticated attacker to repeatedly trigger OTP email generation without restriction. As a result, an attacker can abuse this functionality to send an excessive volume of OTP emails to targeted users. The consequences include potential denial-of-service (DoS) conditions on the email infrastructure or the Schule application itself due to resource exhaustion. Additionally, this can facilitate user harassment through email flooding, potentially impacting user trust and system reputation. The vulnerability does not require authentication or user interaction, making exploitation straightforward over the network. The issue was addressed and fixed in version 1.0.1 of Schule by implementing appropriate rate limiting controls on the OTP request functionality. The CVSS 4.0 base score is 6.6 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, no impact on confidentiality, integrity, or availability directly, but high impact on availability through resource exhaustion. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using Schule as their school management system, this vulnerability poses a risk primarily to service availability and user experience. Exploitation can lead to denial-of-service conditions by overwhelming the email system or the Schule application with excessive OTP requests, potentially disrupting password recovery workflows and other dependent services. This disruption can affect students, teachers, and administrative staff, impeding critical educational operations. Furthermore, the ability to flood users with OTP emails can cause harassment and reduce user confidence in the platform's security. Given the sensitive nature of educational data and the reliance on digital platforms in European schools, such disruptions could have cascading effects on educational continuity and compliance with data protection regulations like GDPR if user contact information is abused. However, since the vulnerability does not allow direct data compromise or privilege escalation, the confidentiality and integrity of data remain intact if exploited solely through this vector.
Mitigation Recommendations
European organizations should immediately upgrade Schule installations to version 1.0.1 or later, where the vulnerability is patched with proper rate limiting controls. Until upgrade is possible, administrators can implement temporary mitigations such as deploying web application firewalls (WAFs) or reverse proxies configured to detect and throttle excessive OTP requests from single IP addresses or user accounts. Monitoring email sending patterns and setting thresholds for OTP email generation can help detect abuse early. Additionally, implementing CAPTCHA challenges on the OTP request form can reduce automated abuse. Organizations should also review email infrastructure capacity and alerting to handle potential spikes in email traffic. Educating users about potential phishing or harassment attempts related to OTP flooding is advisable. Finally, maintaining up-to-date backups and incident response plans will help mitigate any operational disruptions caused by exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-19T15:46:00.395Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683099ad0acd01a249274024
Added to database: 5/23/2025, 3:52:13 PM
Last enriched: 7/8/2025, 9:41:31 PM
Last updated: 8/14/2025, 6:24:26 PM
Views: 14
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.