Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r4hj-gx22-xfqh

Опубликовано: 18 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.8
CVSS3: 6.5

Описание

Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

EPSS

Процентиль: 4%
0.00019
Низкий

6.8 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 6.5
nvd
3 месяца назад

Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account. Only version 4.1 was tested and confirmed as vulnerable. This issue was fixed in version 4.1 build 2250.

EPSS

Процентиль: 4%
0.00019
Низкий

6.8 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-352