In Ascertia SigningHub through 8.6.8, there is a lack of rate limiting on the reset password function, leading to an email bombing vulnerability. An authenticated attacker can exploit this by automating reset password requests.
References
| Link | Resource |
|---|---|
| https://github.com/saykino/CVE-2025-54321 | Third Party Advisory |
| https://www.ascertia.com/company/vulnerability-disclosure-policy/ | Vendor Advisory |
Configurations
History
20 Nov 2025, 19:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/saykino/CVE-2025-54321 - Third Party Advisory | |
| References | () https://www.ascertia.com/company/vulnerability-disclosure-policy/ - Vendor Advisory | |
| First Time |
Ascertia signinghub
Ascertia |
|
| CPE | cpe:2.3:a:ascertia:signinghub:*:*:*:*:*:*:*:* |
19 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-799 |
18 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 19:15
Updated : 2025-11-20 19:00
NVD link : CVE-2025-54321
Mitre link : CVE-2025-54321
CVE.ORG link : CVE-2025-54321
JSON object : View
Products Affected
ascertia
- signinghub
CWE
CWE-799
Improper Control of Interaction Frequency
