Home

Description

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.

PUBLISHED Reserved 2025-09-09 | Published 2025-11-18 | Updated 2025-12-05 | Assigner CERT-PL




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-307 Improper Restriction of Excessive Authentication Attempts

Product status

Default status
unaffected

Any version
affected

Credits

Karol Czubernat finder

References

windu.org product

cert.pl/posts/2025/11/CVE-2025-59110 third-party-advisory

cve.org (CVE-2025-59113)

nvd.nist.gov (CVE-2025-59113)

Download JSON