Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10719: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass

0
Medium
VulnerabilityCVE-2025-10719cvecve-2025-10719cwe-639
Published: Fri Sep 19 2025 (09/19/2025, 10:06:37 UTC)
Source: CVE Database V5
Vendor/Project: WisdomGarden
Product: Tronclass

Description

Tronclass developed by WisdomGarden has an Insecure Direct object Reference vulnerability, allowing remote attackers with regular privilege to modify a specific parameter to access other users' files.

AI-Powered Analysis

AILast updated: 09/19/2025, 10:11:11 UTC

Technical Analysis

CVE-2025-10719 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Tronclass product developed by WisdomGarden. The vulnerability arises from an Insecure Direct Object Reference (IDOR) flaw, where the application fails to properly validate user-supplied parameters that control access to files. Specifically, remote attackers who already possess regular user privileges can manipulate a particular parameter, likely an identifier or key, to gain unauthorized access to files belonging to other users. This bypasses intended access controls and compromises confidentiality. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) shows that the attack is network-based, requires low attack complexity, and privileges at the user level, with no user interaction needed. The impact is limited to confidentiality loss, with no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected version is listed as "0," which may indicate an initial or unspecified version. The vulnerability highlights a failure in access control mechanisms, allowing unauthorized file access through manipulation of user-controlled keys or parameters.

Potential Impact

For European organizations using Tronclass by WisdomGarden, this vulnerability poses a risk to the confidentiality of sensitive user data stored within the platform. Educational institutions or enterprises leveraging Tronclass for file sharing or collaboration could face unauthorized disclosure of personal or proprietary information. Although the vulnerability does not affect data integrity or system availability, the exposure of confidential files could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. Since exploitation requires only regular user privileges and no user interaction, insider threats or compromised user accounts could be leveraged to escalate access to other users' files. The medium severity rating suggests that while the risk is not critical, it should be addressed promptly to prevent data leakage and maintain trust in the platform's security posture.

Mitigation Recommendations

1. Immediate mitigation should include implementing strict server-side validation of all user-supplied parameters controlling file access to ensure users can only access their own files. 2. Employ robust access control checks that verify ownership or permission before serving requested resources. 3. Conduct a thorough code review focusing on authorization logic related to file access and user-controlled keys. 4. If possible, deploy Web Application Firewalls (WAFs) with rules to detect and block suspicious parameter tampering attempts targeting file access endpoints. 5. Monitor logs for unusual access patterns indicative of parameter manipulation or unauthorized file access. 6. Coordinate with WisdomGarden to obtain patches or updates addressing this vulnerability and apply them as soon as available. 7. Educate users about the importance of safeguarding their credentials to reduce risk from compromised accounts. 8. Consider implementing multi-factor authentication to reduce the likelihood of unauthorized access via compromised user accounts. 9. For organizations with sensitive data, consider encrypting files at rest and in transit to add an additional layer of protection even if unauthorized access occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-09-19T09:59:13.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cd2c28287bbd261d2ca758

Added to database: 9/19/2025, 10:10:48 AM

Last enriched: 9/19/2025, 10:11:11 AM

Last updated: 11/4/2025, 3:40:06 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats