CVE-2023-25156

Source
https://cve.org/CVERecord?id=CVE-2023-25156
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25156.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-25156
Aliases
Published
2023-02-15T00:00:00Z
Modified
2025-11-29T14:02:08.742990Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Kiwi TCMS has no protection against brute-force attacks on login page
Details

Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt brute-force attacks against the login page. Users should upgrade to v12.0 or later to receive a patch. As a workaround, users may install and configure a rate-limiting proxy in front of Kiwi TCMS.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/25xxx/CVE-2023-25156.json",
    "cwe_ids": [
        "CWE-770"
    ]
}
References

Affected packages

Git / github.com/kiwitcms/kiwi

Affected ranges

Type
GIT
Repo
https://github.com/kiwitcms/kiwi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

tcms-api-1.*

tcms-api-1.4.0
tcms-api-1.5.0
tcms-api-1.5.1

tcms-api-4.*

tcms-api-4.0.0
tcms-api-4.2

tcms-api-5.*

tcms-api-5.0
tcms-api-5.1
tcms-api-5.2
tcms-api-5.3

v10.*

v10.0
v10.1
v10.2
v10.3
v10.4
v10.5

v11.*

v11.0
v11.1
v11.2
v11.3
v11.4
v11.5
v11.6
v11.7

v3.*

v3.21.1
v3.21.2
v3.22
v3.23
v3.26
v3.28
v3.30
v3.32
v3.33
v3.37
v3.38
v3.39
v3.41
v3.44
v3.48
v3.49
v3.50
v3.8.17-1
v3.8.18
v3.8.18.21

v4.*

v4.0.0
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.2

v5.*

v5.0
v5.1
v5.2
v5.3
v5.3.1

v6.*

v6.0
v6.0.1
v6.1
v6.1.1
v6.10
v6.11
v6.2
v6.2.1
v6.3
v6.4
v6.5.1
v6.5.2
v6.5.3
v6.6
v6.7
v6.8
v6.9

v7.*

v7.0
v7.1
v7.2
v7.2.1
v7.3

v8.*

v8.0
v8.1
v8.2
v8.3
v8.4
v8.5
v8.6
v8.6.1
v8.7
v8.8
v8.9

v9.*

v9.0
v9.0.1

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25156.json"