Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59112: CWE-352 Cross-Site Request Forgery (CSRF) in JCD Windu CMS

0
Medium
VulnerabilityCVE-2025-59112cvecve-2025-59112cwe-352
Published: Tue Nov 18 2025 (11/18/2025, 13:26:31 UTC)
Source: CVE Database V5
Vendor/Project: JCD
Product: Windu CMS

Description

Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send POST request that deletes given user. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 11/18/2025, 13:54:10 UTC

Technical Analysis

CVE-2025-59112 identifies a Cross-Site Request Forgery (CSRF) vulnerability in Windu CMS version 4.1, a content management system developed by JCD. The vulnerability resides in the user editing functionality, specifically allowing an attacker to craft a malicious website that automatically sends a POST request to the CMS to delete a targeted user account when visited by an authenticated victim. This attack exploits the lack of proper CSRF protections such as anti-CSRF tokens or origin checks, enabling unauthorized state-changing actions without the victim's explicit consent. The vulnerability does not require the attacker to have any privileges or authentication, relying solely on the victim's active session and interaction with the malicious site. The vendor was notified early but has not disclosed detailed vulnerability information or provided patches, and only version 4.1 has been confirmed vulnerable; other versions remain untested but potentially affected. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact primarily affects the integrity and availability of user accounts, potentially leading to denial of service for affected users or privilege escalation if administrative accounts are deleted. No known exploits are currently reported in the wild, but the vulnerability poses a risk to organizations relying on Windu CMS for web content management.

Potential Impact

For European organizations using Windu CMS version 4.1, this vulnerability can lead to unauthorized deletion of user accounts, disrupting normal operations and potentially causing denial of service for legitimate users. If administrative or privileged accounts are deleted, it could result in loss of control over the CMS, impacting website availability and integrity. This could affect public-facing websites, intranets, or other critical web services managed via Windu CMS. The attack requires user interaction but no authentication or elevated privileges, making it feasible for attackers to exploit via social engineering or malicious links. The lack of vendor patches increases the risk exposure duration. Organizations in sectors such as government, education, and media that rely on Windu CMS for content management may face reputational damage, operational disruption, and increased recovery costs. Additionally, the vulnerability could be leveraged as part of a broader attack chain targeting web infrastructure.

Mitigation Recommendations

1. Implement CSRF protection mechanisms such as synchronizer tokens or double-submit cookies in the Windu CMS user editing functionality to validate legitimate requests. 2. Restrict user deletion permissions strictly to trusted administrative roles and enforce multi-factor authentication for these accounts to reduce risk if compromised. 3. Monitor web server logs and application logs for unusual POST requests targeting user deletion endpoints, especially those originating from external referrers. 4. Educate users and administrators about the risks of clicking untrusted links and visiting suspicious websites to reduce successful social engineering attempts. 5. If possible, isolate the CMS administrative interface behind VPN or IP allowlists to limit exposure. 6. Regularly back up user data and CMS configurations to enable rapid recovery in case of unauthorized deletions. 7. Engage with the vendor or community to obtain or develop patches addressing the CSRF vulnerability and apply them promptly once available. 8. Conduct security testing on other Windu CMS versions in use to assess vulnerability presence and apply mitigations accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-09-09T09:50:09.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c7a583fd37bbc3955e431

Added to database: 11/18/2025, 1:53:28 PM

Last enriched: 11/18/2025, 1:54:10 PM

Last updated: 11/20/2025, 10:54:47 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats