We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48375

Schule Missing Rate Limiting on OTP Email Requests – Susceptible to Abuse & DoS



Description

Schule is open-source school management system software. Prior to version 1.0.1, the file forgot_password.php (or equivalent endpoint responsible for email-based OTP generation) lacks proper rate limiting controls, allowing attackers to abuse the OTP request functionality. This vulnerability can be exploited to send an excessive number of OTP emails, leading to potential denial-of-service (DoS) conditions or facilitating user harassment through email flooding. Version 1.0.1 fixes the issue.

Reserved 2025-05-19 | Published 2025-05-23 | Updated 2025-05-23 | Assigner GitHub_M


MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 1.0.1
affected

References

github.com/...Schule/security/advisories/GHSA-h3f2-mc85-67gc

cve.org (CVE-2025-48375)

nvd.nist.gov (CVE-2025-48375)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48375

Support options

Helpdesk Chat, Email, Knowledgebase