CVE-2025-59114
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-12-05
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| windu | windu_cms | 4.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) in the file uploading functionality of Windu CMS. An attacker can create a malicious website that, when visited by a victim, automatically sends a malicious file to the Windu CMS server without the victim's consent.
How can this vulnerability impact me? :
This vulnerability can allow attackers to upload malicious files to the server, potentially leading to unauthorized actions, server compromise, or further exploitation of the system hosting Windu CMS.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid visiting untrusted websites that could trigger malicious file uploads. Since the vulnerability involves Cross-Site Request Forgery in the file uploading functionality of Windu CMS version 4.1, consider disabling or restricting file upload features until a patch or official fix is available. Monitor and restrict HTTP requests that attempt to upload files without proper authentication or CSRF tokens.