CVE-2025-59111: CWE-863 Incorrect Authorization in JCD Windu CMS
Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
AI Analysis
Technical Summary
CVE-2025-59111 is an incorrect authorization vulnerability (CWE-863) identified in Windu CMS version 4.1. The flaw exists in the user editing functionality where a privileged user can send a specially crafted GET request to delete Super Admin accounts. This action is not possible through the standard graphical user interface, indicating a bypass of intended access controls. The vulnerability arises because the backend does not properly verify authorization for this operation, allowing privilege escalation by removing top-level administrators. The issue was confirmed only in version 4.1 and has been fixed in build 2250 of the same version. The CVSS 4.0 score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no user interaction, and the need for privileged user access. The vulnerability impacts integrity by enabling unauthorized deletion of critical accounts and confidentiality indirectly by potentially disrupting administrative controls. No public exploits are known, but the vulnerability could be leveraged by insiders or attackers who have gained privileged access. The flaw highlights the importance of rigorous access control enforcement in CMS platforms, especially for administrative functions.
Potential Impact
For European organizations using Windu CMS 4.1, this vulnerability poses a significant risk to administrative account integrity and overall system security. Unauthorized deletion of Super Admin accounts can lead to loss of control over the CMS, disruption of website management, and potential denial of service for administrative functions. This could facilitate further attacks, including persistent unauthorized access or data manipulation. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Windu CMS for content management may face operational disruptions and reputational damage. The medium severity score reflects that while exploitation requires privileged access, the impact on confidentiality and integrity is substantial. The lack of user interaction and low attack complexity means that once privileged access is obtained, exploitation is straightforward. European entities must consider the risk of insider threats or compromised privileged accounts that could exploit this vulnerability.
Mitigation Recommendations
European organizations should immediately verify their Windu CMS version and upgrade to version 4.1 build 2250 or later where the vulnerability is patched. In addition to patching, organizations should audit privileged user accounts and monitor for unusual deletion activities of administrative accounts. Implement strict role-based access controls and limit the number of users with privileged access to reduce the attack surface. Employ web application firewalls (WAFs) to detect and block suspicious GET requests targeting user management endpoints. Conduct regular security assessments and penetration tests focusing on access control mechanisms within the CMS. Maintain comprehensive logging and alerting for administrative actions to enable rapid detection and response to unauthorized activities. Finally, educate administrators about the risks of privilege misuse and enforce multi-factor authentication to protect privileged accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Poland, Italy, Spain
CVE-2025-59111: CWE-863 Incorrect Authorization in JCD Windu CMS
Description
Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
AI-Powered Analysis
Technical Analysis
CVE-2025-59111 is an incorrect authorization vulnerability (CWE-863) identified in Windu CMS version 4.1. The flaw exists in the user editing functionality where a privileged user can send a specially crafted GET request to delete Super Admin accounts. This action is not possible through the standard graphical user interface, indicating a bypass of intended access controls. The vulnerability arises because the backend does not properly verify authorization for this operation, allowing privilege escalation by removing top-level administrators. The issue was confirmed only in version 4.1 and has been fixed in build 2250 of the same version. The CVSS 4.0 score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no user interaction, and the need for privileged user access. The vulnerability impacts integrity by enabling unauthorized deletion of critical accounts and confidentiality indirectly by potentially disrupting administrative controls. No public exploits are known, but the vulnerability could be leveraged by insiders or attackers who have gained privileged access. The flaw highlights the importance of rigorous access control enforcement in CMS platforms, especially for administrative functions.
Potential Impact
For European organizations using Windu CMS 4.1, this vulnerability poses a significant risk to administrative account integrity and overall system security. Unauthorized deletion of Super Admin accounts can lead to loss of control over the CMS, disruption of website management, and potential denial of service for administrative functions. This could facilitate further attacks, including persistent unauthorized access or data manipulation. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Windu CMS for content management may face operational disruptions and reputational damage. The medium severity score reflects that while exploitation requires privileged access, the impact on confidentiality and integrity is substantial. The lack of user interaction and low attack complexity means that once privileged access is obtained, exploitation is straightforward. European entities must consider the risk of insider threats or compromised privileged accounts that could exploit this vulnerability.
Mitigation Recommendations
European organizations should immediately verify their Windu CMS version and upgrade to version 4.1 build 2250 or later where the vulnerability is patched. In addition to patching, organizations should audit privileged user accounts and monitor for unusual deletion activities of administrative accounts. Implement strict role-based access controls and limit the number of users with privileged access to reduce the attack surface. Employ web application firewalls (WAFs) to detect and block suspicious GET requests targeting user management endpoints. Conduct regular security assessments and penetration tests focusing on access control mechanisms within the CMS. Maintain comprehensive logging and alerting for administrative actions to enable rapid detection and response to unauthorized activities. Finally, educate administrators about the risks of privilege misuse and enforce multi-factor authentication to protect privileged accounts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-09-09T09:50:09.670Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691c7a583fd37bbc3955e42d
Added to database: 11/18/2025, 1:53:28 PM
Last enriched: 12/6/2025, 4:13:43 AM
Last updated: 1/7/2026, 8:47:17 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.