Schule is open-source school management system software. Prior to version 1.0.1, the file forgot_password.php (or equivalent endpoint responsible for email-based OTP generation) lacks proper rate limiting controls, allowing attackers to abuse the OTP request functionality. This vulnerability can be exploited to send an excessive number of OTP emails, leading to potential denial-of-service (DoS) conditions or facilitating user harassment through email flooding. Version 1.0.1 fixes the issue.
References
Link | Resource |
---|---|
https://github.com/schule111/Schule/security/advisories/GHSA-h3f2-mc85-67gc | Vendor Advisory Exploit |
Configurations
History
05 Sep 2025, 14:10
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:schule111:schule_school_management_system:1.0.0:*:*:*:*:*:*:* | |
First Time |
Schule111
Schule111 schule School Management System |
|
References | () https://github.com/schule111/Schule/security/advisories/GHSA-h3f2-mc85-67gc - Vendor Advisory, Exploit |
28 May 2025, 14:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-23 16:15
Updated : 2025-09-05 14:10
NVD link : CVE-2025-48375
Mitre link : CVE-2025-48375
CVE.ORG link : CVE-2025-48375
JSON object : View
Products Affected
schule111
- schule_school_management_system
CWE
CWE-770
Allocation of Resources Without Limits or Throttling