Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References
| Link | Resource |
|---|---|
| https://cert.pl/posts/2025/11/CVE-2025-59110 | Third Party Advisory |
| https://windu.org | Product |
Configurations
History
20 Nov 2025, 15:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:windu:windu_cms:4.1:*:*:*:*:*:*:* | |
| References | () https://cert.pl/posts/2025/11/CVE-2025-59110 - Third Party Advisory | |
| References | () https://windu.org - Product | |
| First Time |
Windu
Windu windu Cms |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
18 Nov 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 15:16
Updated : 2025-11-20 15:44
NVD link : CVE-2025-59111
Mitre link : CVE-2025-59111
CVE.ORG link : CVE-2025-59111
JSON object : View
Products Affected
windu
- windu_cms
CWE
CWE-863
Incorrect Authorization
