Unrated severityNVD Advisory· Published Nov 18, 2025· Updated Dec 5, 2025
Bruteforce Protection Bypass in Windu CMS
CVE-2025-59113
Description
Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter.
Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.
Affected products
2- JCD/Windu CMSv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- cert.pl/posts/2025/11/CVE-2025-59110mitrethird-party-advisory
- windu.orgmitreproduct
News mentions
0No linked articles in our index yet.