Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xphg-w288-5vjw

Опубликовано: 30 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 6.5

Описание

PAD CMS implements weak client-side brute-force protection by utilizing two cookies:  login_count and login_timeout. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting those cookies. This issue affects all 3 templates: www, bip and www+bip.

This product is End-Of-Life and producent will not publish patches for this vulnerability.

PAD CMS implements weak client-side brute-force protection by utilizing two cookies:  login_count and login_timeout. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting those cookies. This issue affects all 3 templates: www, bip and www+bip.

This product is End-Of-Life and producent will not publish patches for this vulnerability.

EPSS

Процентиль: 15%
0.00049
Низкий

6.9 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-307

Связанные уязвимости

CVSS3: 6.5
nvd
4 месяца назад

PAD CMS implements weak client-side brute-force protection by utilizing two cookies:  login_count and login_timeout. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting those cookies. This issue affects all 3 templates: www, bip and www+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.

EPSS

Процентиль: 15%
0.00049
Низкий

6.9 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-307