CVE-2025-59113

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References
Link Resource
https://cert.pl/posts/2025/11/CVE-2025-59110 Third Party Advisory
https://windu.org Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:windu:windu_cms:4.1:*:*:*:*:*:*:*

History

20 Nov 2025, 15:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Windu
Windu windu Cms
CPE cpe:2.3:a:windu:windu_cms:4.1:*:*:*:*:*:*:*
References () https://cert.pl/posts/2025/11/CVE-2025-59110 - () https://cert.pl/posts/2025/11/CVE-2025-59110 - Third Party Advisory
References () https://windu.org - () https://windu.org - Product

18 Nov 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 15:16

Updated : 2025-11-20 15:33


NVD link : CVE-2025-59113

Mitre link : CVE-2025-59113

CVE.ORG link : CVE-2025-59113


JSON object : View

Products Affected

windu

  • windu_cms
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts