CVE-2025-59113

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
References
Link Resource
https://cert.pl/posts/2025/11/CVE-2025-59110 Third Party Advisory
https://windu.org Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:windu:windu_cms:4.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-18 15:16

Updated : 2025-12-05 13:16


NVD link : CVE-2025-59113

Mitre link : CVE-2025-59113

CVE.ORG link : CVE-2025-59113


JSON object : View

Products Affected

windu

  • windu_cms
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts