Home

Description

PAD CMS implements weak client-side brute-force protection by utilizing two cookies:  login_count and login_timeout. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting those cookies. This issue affects all 3 templates: www, bip and www+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.

PUBLISHED Reserved 2025-07-24 | Published 2025-09-30 | Updated 2025-09-30 | Assigner CERT-PL




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-307 Improper Restriction of Excessive Authentication Attempts

Product status

Default status
unknown

Any version
affected

Credits

Mateusz Jurczak (CERT.PL) finder

References

cert.pl/posts/2025/09/CVE-2025-7063

cve.org (CVE-2025-8118)

nvd.nist.gov (CVE-2025-8118)

Download JSON