Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2997: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass

0
Medium
VulnerabilityCVE-2026-2997cvecve-2026-2997cwe-639
Published: Mon Feb 23 2026 (02/23/2026, 01:55:37 UTC)
Source: CVE Database V5
Vendor/Project: WisdomGarden
Product: Tronclass

Description

Tronclass developed by WisdomGarden has a Insecure Direct Object Reference vulnerability. After obtaining a course ID, authenticated remote attackers to modify a specific parameter to obtain a course invitation code, thereby joining any course.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 06:37:33 UTC

Technical Analysis

The vulnerability identified as CVE-2026-2997 affects WisdomGarden's Tronclass educational platform. It is an instance of CWE-639, an authorization bypass caused by insecure direct object references (IDOR). Specifically, after an attacker authenticates, they can obtain a valid course ID and then modify a parameter in requests to retrieve the course invitation code for any course. This unauthorized access allows the attacker to join courses without legitimate enrollment or permission. The vulnerability arises because the application fails to properly verify that the authenticated user is authorized to access the requested course invitation code, relying instead on user-controlled input to identify the course. The CVSS 3.1 base score of 5.4 reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity at a low level, as unauthorized users can access invitation codes and join courses, potentially exposing course content or disrupting course membership integrity. No availability impact is noted. The affected version is listed as 0, indicating an early or initial release of the product. No patches or known exploits have been reported at the time of publication. The vulnerability was assigned and published by TW-CERT on February 23, 2026.

Potential Impact

Organizations using WisdomGarden's Tronclass platform are at risk of unauthorized course enrollment by authenticated users exploiting this vulnerability. This can lead to unauthorized access to potentially sensitive educational content, disruption of course management, and compromise of the integrity of course membership data. Educational institutions, training providers, and corporate learning environments relying on Tronclass could face confidentiality breaches of course materials and unauthorized participation in courses, which may affect intellectual property and privacy. While the vulnerability does not directly impact system availability, the integrity and confidentiality impacts could undermine trust in the platform and require costly remediation and user management efforts. The requirement for authenticated access limits exploitation to insiders or registered users, but the low complexity and network accessibility increase the risk within those user populations.

Mitigation Recommendations

To mitigate this vulnerability, WisdomGarden should implement strict authorization checks on all requests involving course invitation codes, ensuring that users can only access invitation codes for courses they are legitimately enrolled in or authorized to join. Parameter validation should be enforced server-side to prevent manipulation of course IDs. Employing access control mechanisms such as role-based access control (RBAC) or attribute-based access control (ABAC) can help restrict access appropriately. Logging and monitoring access to course invitation codes can detect suspicious activity. Organizations should apply any patches or updates provided by WisdomGarden promptly once available. In the interim, administrators can restrict course invitation code visibility and limit enrollment permissions to trusted users. Conducting a security audit of the platform’s authorization logic and educating users about secure credential handling can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2026-02-23T01:38:26.604Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699bbc2cbe58cf853bf3201f

Added to database: 2/23/2026, 2:32:12 AM

Last enriched: 3/2/2026, 6:37:33 AM

Last updated: 4/9/2026, 11:48:36 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses