{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59111","assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","state":"PUBLISHED","assignerShortName":"CERT-PL","dateReserved":"2025-09-09T09:50:09.670Z","datePublished":"2025-11-18T13:26:39.486Z","dateUpdated":"2025-12-05T12:21:10.295Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Windu CMS","vendor":"JCD","versions":[{"changes":[{"at":"build 2250","status":"unaffected"}],"lessThanOrEqual":"4.1","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Karol Czubernat"}],"datePublic":"2025-11-18T10:55:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request <span style=\"background-color: rgb(255, 255, 255);\">which</span> allows privileged users to delete Super Admins which is not possible with GUI.<br><br>Only version 4.1 was tested and confirmed as vulnerable.<br>This issue was fixed in version 4.1 build 2250.<br>"}],"value":"Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI.\n\nOnly version 4.1 was tested and confirmed as vulnerable.\nThis issue was fixed in version 4.1 build 2250."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL","dateUpdated":"2025-12-05T12:21:10.295Z"},"references":[{"tags":["product"],"url":"https://windu.org"},{"tags":["third-party-advisory"],"url":"https://cert.pl/posts/2025/11/CVE-2025-59110"}],"source":{"discovery":"EXTERNAL"},"title":"Broken Access Control in Windu CMS","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-18T15:31:56.660563Z","id":"CVE-2025-59111","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-18T15:32:08.259Z"}}]}}