CVE-2025-52837: CWE-64: Windows Shortcut Following (.LNK) in Trend Micro, Inc. Trend Micro Password Manager
Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
CVE-2025-52837: CWE-64: Windows Shortcut Following (.LNK) in Trend Micro, Inc. Trend Micro Password Manager
Description
Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- trendmicro
- Date Reserved
- 2025-06-19T15:06:34.443Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68700df3a83201eaaca957c3
Added to database: 7/10/2025, 7:01:07 PM
Last updated: 7/10/2025, 7:01:07 PM
Views: 1
Related Threats
CVE-2025-52473: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in open-quantum-safe liboqs
MediumCVE-2025-28245: n/a
UnknownCVE-2025-28244: n/a
UnknownCVE-2025-53503: CWE-64: Windows Shortcut Following (.LNK) in Trend Micro, Inc. Trend Micro Cleaner One Pro
HighCVE-2025-53378: CWE-306: Missing Authentication for Critical Function in Trend Micro, Inc. Trend Micro Worry-Free Business Security Services
HighActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.