Plateforme
php
Composant
windu-cms
Corrigé dans
4.1.1
CVE-2025-59110 describes a Cross-Site Request Forgery (CSRF) vulnerability affecting Windu CMS. This flaw allows an attacker to bypass the CSRF token protection mechanism within the user editing functionality, potentially leading to unauthorized modifications of user accounts. The vulnerability impacts versions 0.0 through 4.1, and a fix is available in version 4.1 build 2250.
The primary impact of this CSRF vulnerability lies in the potential for unauthorized modification of user accounts. An attacker could leverage this flaw to change user roles, permissions, or other sensitive account settings. Given that Windu CMS allows open registration, an attacker could potentially create a new account, gain access, and then exploit the CSRF vulnerability to compromise other user accounts. This could lead to data breaches, privilege escalation, and disruption of CMS operations. The open registration aspect significantly broadens the attack surface, as attackers can easily create accounts to launch CSRF attacks.
CVE-2025-59110 was publicly disclosed on 2025-11-18. No public proof-of-concept (PoC) code has been identified at the time of writing. The vulnerability's severity is pending evaluation. It is not currently listed on the CISA KEV catalog.
Organizations utilizing Windu CMS for content management, particularly those with open registration enabled, are at risk. Shared hosting environments where multiple CMS instances reside on the same server are also at increased risk, as a compromise of one instance could potentially be leveraged to attack others.
• php / web:
curl -I 'http://your-windu-cms/admin/user/edit?csrf_token=malicious_token'• php / web: Examine Windu CMS configuration files for any custom CSRF token validation logic that might be bypassed.
• php / web: Review access logs for unusual requests to the /admin/user/edit endpoint with potentially manipulated CSRF tokens.
disclosure
Statut de l'Exploit
EPSS
0.03% (percentile 7%)
CISA SSVC
The recommended mitigation for CVE-2025-59110 is to immediately upgrade Windu CMS to version 4.1 build 2250. If upgrading is not immediately feasible, consider implementing a temporary workaround by enforcing stricter CSRF token validation on the user editing endpoint. This might involve implementing additional checks to ensure the token's validity and origin. Web application firewalls (WAFs) can also be configured to detect and block malicious CSRF requests targeting the user editing functionality. After upgrading, confirm the fix by attempting to modify a test user account through a crafted CSRF request; the request should be rejected.
Mettez à jour Windu CMS à la version 4.1 build 2250 ou supérieure. Cette version contient la correction pour la vulnérabilité CSRF. Il est recommandé d'effectuer la mise à jour dès que possible pour éviter d'éventuelles attaques.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2025-59110 is a Cross-Site Request Forgery (CSRF) vulnerability in Windu CMS allowing attackers to modify user accounts by bypassing CSRF token protection.
You are affected if you are using Windu CMS versions 0.0 through 4.1. Version 4.1 build 2250 contains the fix.
Upgrade Windu CMS to version 4.1 build 2250. As a temporary workaround, enforce stricter CSRF token validation.
There is no confirmed active exploitation of CVE-2025-59110 at this time, but the vulnerability is publicly known.
Refer to the Windu CMS official website or security advisory page for the most up-to-date information regarding CVE-2025-59110.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.