CVE-2025-54321

In Ascertia SigningHub through 8.6.8, there is a lack of rate limiting on the reset password function, leading to an email bombing vulnerability. An authenticated attacker can exploit this by automating reset password requests.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ascertia:signinghub:*:*:*:*:*:*:*:*

History

20 Nov 2025, 19:00

Type Values Removed Values Added
References () https://github.com/saykino/CVE-2025-54321 - () https://github.com/saykino/CVE-2025-54321 - Third Party Advisory
References () https://www.ascertia.com/company/vulnerability-disclosure-policy/ - () https://www.ascertia.com/company/vulnerability-disclosure-policy/ - Vendor Advisory
First Time Ascertia signinghub
Ascertia
CPE cpe:2.3:a:ascertia:signinghub:*:*:*:*:*:*:*:*

19 Nov 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-799

18 Nov 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 19:15

Updated : 2025-11-20 19:00


NVD link : CVE-2025-54321

Mitre link : CVE-2025-54321

CVE.ORG link : CVE-2025-54321


JSON object : View

Products Affected

ascertia

  • signinghub
CWE
CWE-799

Improper Control of Interaction Frequency