CVE-2025-35436
- EPSS 0.05%
- Veröffentlicht 17.09.2025 16:53:47
- Zuletzt bearbeitet 19.12.2025 12:34:10
CISA Thorium uses '.unwrap()' to handle errors related to account verification email messages. An unauthenticated remote attacker could cause a crash by providing a specially crafted email address or response. Fixed in commit 6a65a27.
CVE-2025-35435
- EPSS 0.14%
- Veröffentlicht 17.09.2025 16:53:22
- Zuletzt bearbeitet 26.09.2025 14:39:46
CISA Thorium accepts a stream split size of zero then divides by this value. A remote, authenticated attacker could cause the service to crash. Fixed in commit 89101a6.
CVE-2025-35434
- EPSS 0.06%
- Veröffentlicht 17.09.2025 16:53:08
- Zuletzt bearbeitet 23.09.2025 15:44:11
CISA Thorium does not validate TLS certificates when connecting to Elasticsearch. An unauthenticated attacker with access to a Thorium cluster could impersonate the Elasticsearch service. Fixed in 1.1.2.
CVE-2025-35433
- EPSS 0.06%
- Veröffentlicht 17.09.2025 16:52:53
- Zuletzt bearbeitet 23.09.2025 15:43:59
CISA Thorium does not properly invalidate previously used tokens when resetting passwords. An attacker that possesses a previously used token could still log in after a password reset. Fixed in 1.1.1.
CVE-2025-35432
- EPSS 0.18%
- Veröffentlicht 17.09.2025 16:52:34
- Zuletzt bearbeitet 23.09.2025 15:44:35
CISA Thorium does not rate limit requests to send account verification email messages. A remote unauthenticated attacker can send unlimited messages to a user who is pending verification. Fixed in 1.1.1 by adding a rate limit set by default to 10 min...
CVE-2025-35431
- EPSS 0.05%
- Veröffentlicht 17.09.2025 16:52:16
- Zuletzt bearbeitet 26.09.2025 14:36:09
CISA Thorium does not escape user controlled strings used in LDAP queries. An authenticated remote attacker can modify LDAP authorization data such as group memberships. Fixed in 1.1.1.
CVE-2025-35430
- EPSS 0.05%
- Veröffentlicht 17.09.2025 16:51:52
- Zuletzt bearbeitet 08.10.2025 19:01:53
CISA Thorium does not adequately validate the paths of downloaded files via 'download_ephemeral' and 'download_children'. A remote, authenticated attacker could access arbitrary files subject to file system permissions. Fixed in 1.1.2.