Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62376: CWE-287: Improper Authentication in pwncollege dojo

0
Critical
VulnerabilityCVE-2025-62376cvecve-2025-62376cwe-287
Published: Tue Oct 14 2025 (10/14/2025, 21:58:27 UTC)
Source: CVE Database V5
Vendor/Project: pwncollege
Product: dojo

Description

pwn.college DOJO is an education platform for learning cybersecurity. In versions up to and including commit 781d91157cfc234a434d0bab45cbcf97894c642e, the /workspace endpoint contains an improper authentication vulnerability that allows an attacker to access any active Windows VM without proper authorization. The vulnerability occurs in the view_desktop function where the user is retrieved via a URL parameter without verifying that the requester has administrative privileges. An attacker can supply any user ID and arbitrary password in the request parameters to impersonate another user. When requesting a Windows desktop service, the function does not validate the supplied password before generating access credentials, allowing the attacker to obtain an iframe source URL that grants full access to the target user's Windows VM. This impacts all users with active Windows VMs, as an attacker can access and modify data on the Windows machine and in the home directory of the associated Linux machine via the Z: drive. This issue has been patched in commit 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef. No known workarounds exist.

AI-Powered Analysis

AILast updated: 10/14/2025, 22:15:17 UTC

Technical Analysis

CVE-2025-62376 is an improper authentication vulnerability classified under CWE-287 found in the pwn.college DOJO platform, specifically affecting versions up to commit 781d91157cfc234a434d0bab45cbcf97894c642e. The vulnerability resides in the /workspace endpoint's view_desktop function, which retrieves the user identifier from a URL parameter without verifying if the requester has administrative privileges or validating the supplied password. This design flaw allows an attacker to supply arbitrary user IDs and passwords to impersonate any user with an active Windows VM session. The function generates an iframe source URL granting full access to the targeted Windows VM without proper authentication checks. Consequently, an attacker can gain unauthorized access to the Windows desktop environment and modify data both on the Windows VM and the associated Linux home directory accessible via the Z: drive. The vulnerability impacts confidentiality, integrity, and availability of user environments. The issue was patched in commit 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef, but no alternative mitigations or workarounds are known. The CVSS 4.0 score of 9.5 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the ease of exploitation and severity make this a high-risk vulnerability for organizations using the affected platform.

Potential Impact

For European organizations using pwn.college DOJO, particularly educational institutions and cybersecurity training centers, this vulnerability poses a significant risk. Attackers could gain unauthorized access to Windows VMs used for training or testing, leading to potential data theft, manipulation, or destruction. Since the vulnerability also allows access to the Linux home directories via the Z: drive, attackers could compromise sensitive user data beyond the Windows environment. This could result in exposure of personal data, intellectual property, or training materials, potentially violating GDPR and other data protection regulations. The ability to fully control virtual machines could also allow attackers to pivot into other network segments if these VMs are connected to broader organizational infrastructure. The critical severity and ease of exploitation mean that unpatched systems are highly vulnerable to compromise, which could disrupt training operations and damage organizational reputation.

Mitigation Recommendations

The primary mitigation is to immediately update pwn.college DOJO to the patched version including commit 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef or later. Since no workarounds exist, organizations should prioritize patch deployment. Additionally, restrict network access to the /workspace endpoint to trusted users and networks where possible, using network segmentation and firewall rules. Implement monitoring and logging of access to the /workspace endpoint to detect anomalous or unauthorized access attempts. Enforce strong access controls and multi-factor authentication on the platform to reduce risk of credential misuse. Educate users about the importance of reporting suspicious activity. For organizations with sensitive data on these VMs, consider isolating or temporarily disabling Windows VM access until the patch is applied. Conduct a post-patch audit to verify that unauthorized access has not occurred.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-10T14:22:48.205Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eecaf64a57b2a930bdf0b1

Added to database: 10/14/2025, 10:13:10 PM

Last enriched: 10/14/2025, 10:15:17 PM

Last updated: 10/15/2025, 4:00:41 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats