CVE-2025-59110
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-12-05
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| windu | windu_cms | 4.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Windu CMS is a Cross-Site Request Forgery (CSRF) issue in the user editing functionality. Although there is a CSRF protection mechanism, it can be bypassed by using the CSRF token of another user. Since registration is open and anyone can create an account, an attacker could exploit this to perform unauthorized actions on behalf of other users.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to perform unauthorized actions on behalf of other users by exploiting the CSRF token bypass. This could lead to unauthorized changes to user accounts or other sensitive operations within the CMS, potentially compromising user data or site integrity.