CVE-2025-59110
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-18

Last updated on: 2025-12-05

Assigner: CERT.PL

Description
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-18
Last Modified
2025-12-05
Generated
2026-05-07
AI Q&A
2025-11-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
windu windu_cms 4.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Windu CMS is a Cross-Site Request Forgery (CSRF) issue in the user editing functionality. Although there is a CSRF protection mechanism, it can be bypassed by using the CSRF token of another user. Since registration is open and anyone can create an account, an attacker could exploit this to perform unauthorized actions on behalf of other users.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to perform unauthorized actions on behalf of other users by exploiting the CSRF token bypass. This could lead to unauthorized changes to user accounts or other sensitive operations within the CMS, potentially compromising user data or site integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart