Home

Description

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PUBLISHED Reserved 2025-09-09 | Published 2025-11-18 | Updated 2025-11-18 | Assigner CERT-PL




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-307 Improper Restriction of Excessive Authentication Attempts

Product status

Default status
unknown

4.1 (semver)
affected

Credits

Karol Czubernat finder

References

windu.org product

cert.pl/posts/2025/11/CVE-2025-59110 third-party-advisory

cve.org (CVE-2025-59113)

nvd.nist.gov (CVE-2025-59113)

Download JSON