Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2r78-2mm9-hw6h

Опубликовано: 18 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.5

Описание

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

EPSS

Процентиль: 13%
0.00042
Низкий

6.9 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-307

Связанные уязвимости

CVSS3: 7.5
nvd
3 месяца назад

Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this parameter. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.

EPSS

Процентиль: 13%
0.00042
Низкий

6.9 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-307