{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-31118","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-03-26T15:04:52.624Z","datePublished":"2025-04-18T15:52:36.923Z","dateUpdated":"2025-04-18T16:02:09.007Z"},"containers":{"cna":{"title":"NamelessMC Has Forum Reply Submission Time Limit Bypass","problemTypes":[{"descriptions":[{"cweId":"CWE-400","lang":"en","description":"CWE-400: Uncontrolled Resource Consumption","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-jhvp-mwj4-922m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-jhvp-mwj4-922m"},{"name":"https://github.com/NamelessMC/Nameless/commit/51e9d93aaa28d40f060b807533d22b768abea207","tags":["x_refsource_MISC"],"url":"https://github.com/NamelessMC/Nameless/commit/51e9d93aaa28d40f060b807533d22b768abea207"},{"name":"https://github.com/NamelessMC/Nameless/releases/tag/v2.2.0","tags":["x_refsource_MISC"],"url":"https://github.com/NamelessMC/Nameless/releases/tag/v2.2.0"}],"affected":[{"vendor":"NamelessMC","product":"Nameless","versions":[{"version":"< 2.2.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-04-18T15:52:36.923Z"},"descriptions":[{"lang":"en","value":"NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In version 2.1.4 and prior, forum quick reply feature (view_topic.php) does not implement any spam prevention mechanism. This allows authenticated users to continuously post replies without any time restriction, resulting in an uncontrolled surge of posts that can disrupt normal operations. This issue has been patched in version 2.2.0."}],"source":{"advisory":"GHSA-jhvp-mwj4-922m","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-jhvp-mwj4-922m","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-18T16:02:05.598696Z","id":"CVE-2025-31118","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-18T16:02:09.007Z"}}]}}