Description
Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
Problem types
CWE-307 Improper Restriction of Excessive Authentication Attempts
Product status
Any version
Credits
Karol Czubernat
References
windu.org
cert.pl/posts/2025/11/CVE-2025-59110