Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2997: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass

0
Medium
VulnerabilityCVE-2026-2997cvecve-2026-2997cwe-639
Published: Mon Feb 23 2026 (02/23/2026, 01:55:37 UTC)
Source: CVE Database V5
Vendor/Project: WisdomGarden
Product: Tronclass

Description

CVE-2026-2997 is an authorization bypass vulnerability in WisdomGarden's Tronclass platform, caused by an insecure direct object reference (IDOR). Authenticated remote attackers who obtain a course ID can manipulate a parameter to retrieve a course invitation code, allowing them to join any course without proper authorization. The vulnerability requires low attack complexity and no user interaction but does require authentication. The CVSS score is 5. 4, indicating medium severity, with limited impact on confidentiality and integrity and no impact on availability. No known exploits are currently reported in the wild. Organizations using Tronclass should prioritize patching or implementing access control checks to prevent unauthorized course access. Countries with significant adoption of WisdomGarden’s educational platforms, especially in East Asia and regions with high e-learning usage, are at higher risk. This vulnerability highlights the need for strict authorization validation on user-controlled parameters to prevent unauthorized resource access.

AI-Powered Analysis

AILast updated: 02/23/2026, 02:46:30 UTC

Technical Analysis

CVE-2026-2997 identifies an Insecure Direct Object Reference (IDOR) vulnerability in the Tronclass product developed by WisdomGarden. The flaw arises from improper authorization checks on a user-controlled parameter related to course invitation codes. Specifically, once an attacker authenticates and obtains a valid course ID, they can modify a request parameter to retrieve the invitation code for that course. This code is intended to be confidential and is used to control access to courses. By exploiting this vulnerability, an attacker can bypass normal authorization mechanisms and join any course without explicit permission. The vulnerability is classified under CWE-639, which pertains to authorization bypass through user-controlled keys. The CVSS v3.1 base score is 5.4, reflecting a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity to a limited extent but does not affect availability. No patches or known exploits are currently documented, indicating that the vulnerability is newly disclosed. The root cause is insufficient validation of user-supplied parameters that control access to sensitive course invitation codes, a common pitfall in web applications managing access to resources. This vulnerability could be leveraged by malicious insiders or external attackers with valid credentials to escalate their access within the e-learning platform.

Potential Impact

The primary impact of CVE-2026-2997 is unauthorized access to courses within the Tronclass platform. Attackers can join courses without proper authorization, potentially gaining access to course materials, discussions, and other sensitive educational content. This could lead to confidentiality breaches of proprietary or sensitive educational information. Integrity may also be affected if unauthorized users can participate in course activities or submit assignments, undermining the trustworthiness of course outcomes. Although availability is not impacted, the breach of access controls could damage the reputation of educational institutions using Tronclass and erode user trust. Organizations relying on Tronclass for secure course management face risks of unauthorized data exposure and potential compliance violations related to data protection regulations. The medium severity score reflects that while the vulnerability is exploitable remotely with low complexity, it requires authenticated access, limiting the attack surface somewhat. However, in environments with many users, the risk of insider threats or credential compromise increases the potential impact.

Mitigation Recommendations

To mitigate CVE-2026-2997, organizations should implement strict server-side authorization checks on all parameters controlling access to course invitation codes. This includes validating that the authenticated user has explicit permission to access the requested course information before disclosing invitation codes. Employing parameter validation and access control mechanisms such as role-based access control (RBAC) or attribute-based access control (ABAC) can help enforce proper authorization. Monitoring and logging access attempts to course invitation codes can aid in detecting suspicious activities. Since no official patches are currently available, administrators should consider restricting access to course invitation code endpoints to trusted users only and applying web application firewalls (WAFs) to detect and block anomalous parameter tampering. Educating users about credential security and enforcing strong authentication can reduce the risk of attackers gaining the necessary privileges to exploit this vulnerability. Finally, WisdomGarden should be engaged to prioritize patch development and timely deployment once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2026-02-23T01:38:26.604Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699bbc2cbe58cf853bf3201f

Added to database: 2/23/2026, 2:32:12 AM

Last enriched: 2/23/2026, 2:46:30 AM

Last updated: 2/23/2026, 7:25:11 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats