A lack of rate limiting in the One-Time Password (OTP) verification endpoint of SigningHub v8.6.8 allows attackers to bypass verification via a bruteforce attack.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 20 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-305 | |
Metrics |
cvssV3_1
|
Mon, 20 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A lack of rate limiting in the One-Time Password (OTP) verification endpoint of SigningHub v8.6.8 allows attackers to bypass verification via a bruteforce attack. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-20T15:57:38.530Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56224

Updated: 2025-10-20T15:57:33.957Z

Status : Received
Published: 2025-10-20T13:15:44.980
Modified: 2025-10-20T16:15:39.067
Link: CVE-2025-56224

No data.

No data.