Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59110: CWE-352 Cross-Site Request Forgery (CSRF) in JCD Windu CMS

0
Medium
VulnerabilityCVE-2025-59110cvecve-2025-59110cwe-352
Published: Tue Nov 18 2025 (11/18/2025, 13:26:29 UTC)
Source: CVE Database V5
Vendor/Project: JCD
Product: Windu CMS

Description

Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:13:32 UTC

Technical Analysis

CVE-2025-59110 identifies a Cross-Site Request Forgery (CSRF) vulnerability in Windu CMS version 4.1, specifically within its user editing functionality. CSRF attacks trick authenticated users into submitting unwanted requests to a web application, potentially causing unauthorized actions. Windu CMS implements a CSRF protection mechanism using tokens; however, this vulnerability allows an attacker to bypass this protection by reusing a CSRF token from another user. Since Windu CMS has open registration, any attacker can create an account and leverage this flaw to perform unauthorized user edits on other accounts. The vulnerability does not require prior authentication but does require user interaction (e.g., clicking a malicious link). The flaw compromises the integrity of user data by allowing unauthorized modifications but does not affect confidentiality or availability directly. The issue was confirmed in version 4.1 and resolved in build 2250 of the same version. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on integrity. No known exploits are currently reported in the wild, but the vulnerability poses a moderate risk due to the ease of exploitation and potential for unauthorized user data manipulation.

Potential Impact

For European organizations using Windu CMS 4.1, this vulnerability could lead to unauthorized changes to user accounts, potentially allowing attackers to escalate privileges, alter user data, or disrupt normal user management workflows. This undermines the integrity of the CMS user base and could facilitate further attacks such as privilege escalation or social engineering. Organizations relying on Windu CMS for public-facing websites or internal portals may face reputational damage and operational disruption if exploited. The open registration feature increases the attack surface, as attackers can freely create accounts to exploit the vulnerability. While confidentiality and availability impacts are limited, the integrity compromise can have cascading effects on trust and security posture. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the medium CVSS score and ease of exploitation.

Mitigation Recommendations

European organizations should immediately upgrade Windu CMS installations to version 4.1 build 2250 or later, where the vulnerability is patched. Until the upgrade is applied, administrators should consider temporarily disabling open registration or restricting user editing capabilities to trusted roles only. Implement additional server-side validation to verify user actions beyond relying solely on CSRF tokens. Monitor user account activities for unusual modifications and implement anomaly detection to identify potential exploitation attempts. Educate users about phishing and social engineering risks to reduce the likelihood of successful CSRF attacks requiring user interaction. Review session management policies to ensure tokens are unique per user and cannot be reused across sessions. Conduct regular security audits and penetration testing focused on CSRF and related web vulnerabilities to proactively identify weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-09-09T09:50:09.669Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c7a583fd37bbc3955e429

Added to database: 11/18/2025, 1:53:28 PM

Last enriched: 12/6/2025, 4:13:32 AM

Last updated: 1/7/2026, 4:20:14 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats