Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 20 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ascertia:signinghub:*:*:*:*:*:*:*:* |
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ascertia
Ascertia signinghub |
|
| Vendors & Products |
Ascertia
Ascertia signinghub |
Wed, 19 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-799 | |
| Metrics |
cvssV3_1
|
Tue, 18 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Ascertia SigningHub through 8.6.8, there is a lack of rate limiting on the reset password function, leading to an email bombing vulnerability. An authenticated attacker can exploit this by automating reset password requests. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-19T16:49:48.558Z
Reserved: 2025-07-20T00:00:00.000Z
Link: CVE-2025-54321
Updated: 2025-11-19T16:20:20.674Z
Status : Analyzed
Published: 2025-11-18T19:15:49.043
Modified: 2025-11-20T19:00:58.973
Link: CVE-2025-54321
No data.
OpenCVE Enrichment
Updated: 2025-11-20T10:30:58Z