Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59112: CWE-352 Cross-Site Request Forgery (CSRF) in JCD Windu CMS

0
Medium
VulnerabilityCVE-2025-59112cvecve-2025-59112cwe-352
Published: Tue Nov 18 2025 (11/18/2025, 13:26:31 UTC)
Source: CVE Database V5
Vendor/Project: JCD
Product: Windu CMS

Description

Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send POST request that deletes given user. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:14:03 UTC

Technical Analysis

CVE-2025-59112 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Windu CMS version 4.1, specifically in the user editing functionality. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this case, an attacker can craft a malicious website that, when visited by a logged-in Windu CMS user, automatically sends a POST request that deletes a targeted user account. This attack exploits the lack of proper CSRF protections such as anti-CSRF tokens or same-site request validation in the affected CMS version. The vulnerability does not require the attacker to have any privileges or authentication on the target system, but it does require the victim to interact by visiting the malicious page. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction and causing limited integrity impact. The vulnerability was confirmed in version 4.1 and fixed in build 2250 of the same version. No public exploits or active exploitation campaigns have been reported to date. Windu CMS is a content management system used by various organizations for website management, and this vulnerability could allow attackers to disrupt user management by deleting accounts, potentially leading to denial of service or administrative disruption.

Potential Impact

For European organizations using Windu CMS version 4.1 or earlier unpatched builds, this vulnerability poses a risk of unauthorized user account deletions through CSRF attacks. This can lead to denial of service for legitimate users, disruption of administrative workflows, and potential loss of access control if critical user accounts are deleted. While the vulnerability does not directly lead to data leakage or system compromise, the integrity and availability of user management functions are affected. Organizations with public-facing Windu CMS installations are particularly at risk, as attackers can lure authenticated users to malicious sites to trigger the exploit. This could impact government, educational, and private sector websites relying on Windu CMS for content management. The requirement for user interaction limits the attack scope but does not eliminate risk, especially in environments where users may be targeted via phishing or social engineering. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

European organizations should immediately verify their Windu CMS version and update to version 4.1 build 2250 or later where the vulnerability is fixed. If immediate patching is not feasible, organizations should implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting user deletion endpoints, especially those lacking valid CSRF tokens or originating from external referrers. Administrators should enforce strict Content Security Policy (CSP) headers to reduce the risk of malicious external content execution. User awareness training to recognize phishing and suspicious links can reduce the likelihood of users visiting malicious sites. Additionally, enabling SameSite cookies with 'Strict' or 'Lax' attributes can help mitigate CSRF risks by restricting cross-origin requests. Regular audits of user accounts and access logs can help detect unauthorized deletions promptly. Finally, developers should review and enhance CSRF protections across all user-modifying functionalities beyond just the patched endpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-09-09T09:50:09.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c7a583fd37bbc3955e431

Added to database: 11/18/2025, 1:53:28 PM

Last enriched: 12/6/2025, 4:14:03 AM

Last updated: 1/7/2026, 8:50:10 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats