Vulnerability Description
Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Windu | Windu Cms | 4.1 |
Related Weaknesses (CWE)
References
- https://cert.pl/posts/2025/11/CVE-2025-59110Third Party Advisory
- https://windu.orgProduct
FAQ
What is CVE-2025-59113?
CVE-2025-59113 is a vulnerability with a CVSS score of 7.5 (HIGH). Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to...
How severe is CVE-2025-59113?
CVE-2025-59113 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59113?
Check the references section above for vendor advisories and patch information. Affected products include: Windu Windu Cms.