Description
Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt brute-force attacks against the login page. Users should upgrade to v12.0 or later to receive a patch. As a workaround, users may install and configure a rate-limiting proxy in front of Kiwi TCMS.
References (4)
Core 4
Core References
Permissions Required
https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/
Scores
CVSS v3
7.5
EPSS
0.0074
EPSS Percentile
73.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
CWE-307
Status
published
Products (2)
kiwitcms/kiwi_tcms
< 12.0
pypi/kiwitcms
0 - 12.0PyPI
Published
Feb 15, 2023
Tracked Since
Feb 18, 2026