Vulnerability Description
Schule is open-source school management system software. The generateOTP() function generates a 4-digit numeric One-Time Password (OTP). Prior to version 1.0.1, even if a secure random number generator is used, the short length and limited range (1000–9999) results in only 9000 possible combinations. This small keyspace makes the OTP highly vulnerable to brute-force attacks, especially in the absence of strong rate-limiting or lockout mechanisms. Version 1.0.1 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schule111 | Schule School Management System | 1.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/schule111/Schule/commit/cd53abbea93943f2c60a5281d45bebadc5763Patch
- https://github.com/schule111/Schule/security/advisories/GHSA-6c48-67xx-vqgcVendor Advisory
FAQ
What is CVE-2025-48372?
CVE-2025-48372 is a vulnerability with a CVSS score of 7.3 (HIGH). Schule is open-source school management system software. The generateOTP() function generates a 4-digit numeric One-Time Password (OTP). Prior to version 1.0.1, even if a secure random number generato...
How severe is CVE-2025-48372?
CVE-2025-48372 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48372?
Check the references section above for vendor advisories and patch information. Affected products include: Schule111 Schule School Management System.