Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59111: CWE-863 Incorrect Authorization in JCD Windu CMS

0
Medium
VulnerabilityCVE-2025-59111cvecve-2025-59111cwe-863
Published: Tue Nov 18 2025 (11/18/2025, 13:26:39 UTC)
Source: CVE Database V5
Vendor/Project: JCD
Product: Windu CMS

Description

Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 11/18/2025, 13:53:58 UTC

Technical Analysis

CVE-2025-59111 is classified under CWE-863 (Incorrect Authorization) and affects Windu CMS version 4.1. The vulnerability arises from improper access control checks in the user editing module, specifically allowing privileged users to delete Super Admin accounts via a specially crafted GET request. This bypasses the normal GUI restrictions that prevent such deletions. The attack vector is network-based and does not require user interaction, but does require the attacker to have privileged user credentials (high privileges). The vulnerability impacts the integrity and availability of the CMS by enabling unauthorized deletion of top-level administrative accounts, which can disrupt management and control of the CMS environment. The vendor was notified early but has not disclosed detailed information or patch availability, and other versions have not been tested, so the vulnerability may affect additional versions. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation without user interaction but requiring privileged access. No known exploits have been reported in the wild, but the potential impact on administrative control is significant.

Potential Impact

For European organizations using Windu CMS, especially version 4.1, this vulnerability poses a risk to the integrity and availability of their content management systems. Successful exploitation could lead to the deletion of Super Admin accounts, effectively locking out legitimate administrators and potentially allowing attackers to escalate privileges or disrupt website management. This could result in service outages, loss of control over website content, and increased risk of further compromise. Organizations in sectors relying heavily on CMS for public-facing or internal portals—such as government, education, and media—may face operational disruptions and reputational damage. Since the vulnerability requires privileged user credentials, insider threats or compromised privileged accounts are the primary risk vectors. The lack of vendor response and patch availability increases the window of exposure, necessitating proactive mitigation.

Mitigation Recommendations

European organizations should immediately audit their Windu CMS installations to identify version 4.1 deployments and assess privileged user account security. Restrict privileged user access strictly and monitor for unusual GET requests targeting user management endpoints. Implement network-level controls such as Web Application Firewalls (WAFs) to detect and block suspicious requests attempting to delete administrative accounts. Employ multi-factor authentication (MFA) for all privileged accounts to reduce the risk of credential compromise. Regularly back up CMS user data and configuration to enable recovery if administrative accounts are deleted. Until a vendor patch is available, consider isolating or limiting access to the CMS administrative interface to trusted networks. Conduct thorough logging and monitoring of user management activities to detect potential exploitation attempts. Engage with the vendor or community for updates on patches or mitigations and test any new versions carefully before deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-09-09T09:50:09.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c7a583fd37bbc3955e42d

Added to database: 11/18/2025, 1:53:28 PM

Last enriched: 11/18/2025, 1:53:58 PM

Last updated: 11/22/2025, 12:00:42 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats