CVE-2025-48738: CWE-770 Allocation of Resources Without Limits or Throttling in StrangeBee TheHive
An e-mail flooding vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows unauthenticated remote attackers to use the password reset feature without limits. This can lead to several consequences, including mailbox storage exhaustion for targeted users, reputation damage to the SMTP server, potentially causing it to be blacklisted, and overload of the SMTP server's outbound mail queue.
AI Analysis
Technical Summary
CVE-2025-48738 is a medium-severity vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting StrangeBee's TheHive versions 5.2.0 through 5.5.0 before their respective patched releases. The vulnerability arises from the password reset feature, which allows unauthenticated remote attackers to trigger an unlimited number of password reset emails. This lack of throttling or rate limiting enables attackers to flood targeted users' mailboxes with reset emails, potentially exhausting mailbox storage quotas. Additionally, the SMTP server responsible for sending these emails can become overloaded, leading to delays or failures in legitimate email delivery. The excessive outbound email traffic may also damage the SMTP server's reputation, increasing the risk of blacklisting by email providers and spam filters. The vulnerability does not require authentication or user interaction, making exploitation straightforward over the network. The affected versions include 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1. No known exploits are currently reported in the wild, but the potential for denial-of-service conditions on mail infrastructure and reputational damage is significant. The CVSS 4.0 score of 6.9 reflects the medium severity, with network attack vector, no privileges or user interaction required, and limited impact on confidentiality and integrity but notable impact on availability and service reliability.
Potential Impact
For European organizations using StrangeBee TheHive, this vulnerability can lead to operational disruptions and reputational harm. Mailbox storage exhaustion can prevent users from receiving critical communications, impacting incident response and security operations if TheHive is used for security incident management. Overloading the SMTP server can degrade email service quality, affecting broader organizational communication. The risk of SMTP server blacklisting can have longer-term consequences, causing legitimate emails to be blocked or marked as spam, which can disrupt business communications and incident notifications. Organizations relying on TheHive for security orchestration and response may experience delays or failures in their workflows, potentially increasing the window of exposure to other threats. The vulnerability also presents a risk of indirect denial-of-service on email infrastructure, which may affect other services relying on the same SMTP servers. Given the unauthenticated nature of the exploit, attackers can launch these attacks remotely without insider access, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately upgrade StrangeBee TheHive to the latest patched versions: 5.2.16 or later for 5.2.x, 5.3.11 or later for 5.3.x, 5.4.10 or later for 5.4.x, and 5.5.1 or later for 5.5.x. Until patches are applied, administrators should implement rate limiting or CAPTCHA challenges on the password reset endpoint to prevent automated abuse. Monitoring outbound SMTP traffic for unusual spikes in password reset emails can help detect exploitation attempts early. Configuring SMTP servers to enforce sending limits per user or per IP address can mitigate the impact of flooding. Additionally, organizations should review mailbox quotas and increase storage limits temporarily if feasible to reduce the risk of mailbox exhaustion. Implementing email reputation monitoring and promptly addressing any blacklisting issues with email providers is critical. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block abnormal password reset request patterns. Finally, educating users about potential phishing or social engineering attempts related to password reset emails can reduce the risk of secondary attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-48738: CWE-770 Allocation of Resources Without Limits or Throttling in StrangeBee TheHive
Description
An e-mail flooding vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows unauthenticated remote attackers to use the password reset feature without limits. This can lead to several consequences, including mailbox storage exhaustion for targeted users, reputation damage to the SMTP server, potentially causing it to be blacklisted, and overload of the SMTP server's outbound mail queue.
AI-Powered Analysis
Technical Analysis
CVE-2025-48738 is a medium-severity vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting StrangeBee's TheHive versions 5.2.0 through 5.5.0 before their respective patched releases. The vulnerability arises from the password reset feature, which allows unauthenticated remote attackers to trigger an unlimited number of password reset emails. This lack of throttling or rate limiting enables attackers to flood targeted users' mailboxes with reset emails, potentially exhausting mailbox storage quotas. Additionally, the SMTP server responsible for sending these emails can become overloaded, leading to delays or failures in legitimate email delivery. The excessive outbound email traffic may also damage the SMTP server's reputation, increasing the risk of blacklisting by email providers and spam filters. The vulnerability does not require authentication or user interaction, making exploitation straightforward over the network. The affected versions include 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1. No known exploits are currently reported in the wild, but the potential for denial-of-service conditions on mail infrastructure and reputational damage is significant. The CVSS 4.0 score of 6.9 reflects the medium severity, with network attack vector, no privileges or user interaction required, and limited impact on confidentiality and integrity but notable impact on availability and service reliability.
Potential Impact
For European organizations using StrangeBee TheHive, this vulnerability can lead to operational disruptions and reputational harm. Mailbox storage exhaustion can prevent users from receiving critical communications, impacting incident response and security operations if TheHive is used for security incident management. Overloading the SMTP server can degrade email service quality, affecting broader organizational communication. The risk of SMTP server blacklisting can have longer-term consequences, causing legitimate emails to be blocked or marked as spam, which can disrupt business communications and incident notifications. Organizations relying on TheHive for security orchestration and response may experience delays or failures in their workflows, potentially increasing the window of exposure to other threats. The vulnerability also presents a risk of indirect denial-of-service on email infrastructure, which may affect other services relying on the same SMTP servers. Given the unauthenticated nature of the exploit, attackers can launch these attacks remotely without insider access, increasing the threat surface.
Mitigation Recommendations
Organizations should immediately upgrade StrangeBee TheHive to the latest patched versions: 5.2.16 or later for 5.2.x, 5.3.11 or later for 5.3.x, 5.4.10 or later for 5.4.x, and 5.5.1 or later for 5.5.x. Until patches are applied, administrators should implement rate limiting or CAPTCHA challenges on the password reset endpoint to prevent automated abuse. Monitoring outbound SMTP traffic for unusual spikes in password reset emails can help detect exploitation attempts early. Configuring SMTP servers to enforce sending limits per user or per IP address can mitigate the impact of flooding. Additionally, organizations should review mailbox quotas and increase storage limits temporarily if feasible to reduce the risk of mailbox exhaustion. Implementing email reputation monitoring and promptly addressing any blacklisting issues with email providers is critical. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block abnormal password reset request patterns. Finally, educating users about potential phishing or social engineering attempts related to password reset emails can reduce the risk of secondary attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-23T00:00:00.000Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6830d8f30acd01a2492755ed
Added to database: 5/23/2025, 8:22:11 PM
Last enriched: 7/8/2025, 8:43:04 PM
Last updated: 8/17/2025, 3:59:14 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.