CVE-2026-2997: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass
CVE-2026-2997 is an authorization bypass vulnerability in WisdomGarden's Tronclass platform, caused by an insecure direct object reference (IDOR). Authenticated remote attackers who obtain a course ID can manipulate a parameter to retrieve a course invitation code, allowing them to join any course without proper authorization. The vulnerability requires low attack complexity and no user interaction but does require authentication. The CVSS score is 5. 4, indicating medium severity, with limited impact on confidentiality and integrity and no impact on availability. No known exploits are currently reported in the wild. Organizations using Tronclass should prioritize patching or implementing access control checks to prevent unauthorized course access. Countries with significant adoption of WisdomGarden’s educational platforms, especially in East Asia and regions with high e-learning usage, are at higher risk. This vulnerability highlights the need for strict authorization validation on user-controlled parameters to prevent unauthorized resource access.
AI Analysis
Technical Summary
CVE-2026-2997 identifies an Insecure Direct Object Reference (IDOR) vulnerability in the Tronclass product developed by WisdomGarden. The flaw arises from improper authorization checks on a user-controlled parameter related to course invitation codes. Specifically, once an attacker authenticates and obtains a valid course ID, they can modify a request parameter to retrieve the invitation code for that course. This code is intended to be confidential and is used to control access to courses. By exploiting this vulnerability, an attacker can bypass normal authorization mechanisms and join any course without explicit permission. The vulnerability is classified under CWE-639, which pertains to authorization bypass through user-controlled keys. The CVSS v3.1 base score is 5.4, reflecting a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity to a limited extent but does not affect availability. No patches or known exploits are currently documented, indicating that the vulnerability is newly disclosed. The root cause is insufficient validation of user-supplied parameters that control access to sensitive course invitation codes, a common pitfall in web applications managing access to resources. This vulnerability could be leveraged by malicious insiders or external attackers with valid credentials to escalate their access within the e-learning platform.
Potential Impact
The primary impact of CVE-2026-2997 is unauthorized access to courses within the Tronclass platform. Attackers can join courses without proper authorization, potentially gaining access to course materials, discussions, and other sensitive educational content. This could lead to confidentiality breaches of proprietary or sensitive educational information. Integrity may also be affected if unauthorized users can participate in course activities or submit assignments, undermining the trustworthiness of course outcomes. Although availability is not impacted, the breach of access controls could damage the reputation of educational institutions using Tronclass and erode user trust. Organizations relying on Tronclass for secure course management face risks of unauthorized data exposure and potential compliance violations related to data protection regulations. The medium severity score reflects that while the vulnerability is exploitable remotely with low complexity, it requires authenticated access, limiting the attack surface somewhat. However, in environments with many users, the risk of insider threats or credential compromise increases the potential impact.
Mitigation Recommendations
To mitigate CVE-2026-2997, organizations should implement strict server-side authorization checks on all parameters controlling access to course invitation codes. This includes validating that the authenticated user has explicit permission to access the requested course information before disclosing invitation codes. Employing parameter validation and access control mechanisms such as role-based access control (RBAC) or attribute-based access control (ABAC) can help enforce proper authorization. Monitoring and logging access attempts to course invitation codes can aid in detecting suspicious activities. Since no official patches are currently available, administrators should consider restricting access to course invitation code endpoints to trusted users only and applying web application firewalls (WAFs) to detect and block anomalous parameter tampering. Educating users about credential security and enforcing strong authentication can reduce the risk of attackers gaining the necessary privileges to exploit this vulnerability. Finally, WisdomGarden should be engaged to prioritize patch development and timely deployment once available.
Affected Countries
China, Taiwan, South Korea, Japan, United States, India, Singapore, Malaysia
CVE-2026-2997: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass
Description
CVE-2026-2997 is an authorization bypass vulnerability in WisdomGarden's Tronclass platform, caused by an insecure direct object reference (IDOR). Authenticated remote attackers who obtain a course ID can manipulate a parameter to retrieve a course invitation code, allowing them to join any course without proper authorization. The vulnerability requires low attack complexity and no user interaction but does require authentication. The CVSS score is 5. 4, indicating medium severity, with limited impact on confidentiality and integrity and no impact on availability. No known exploits are currently reported in the wild. Organizations using Tronclass should prioritize patching or implementing access control checks to prevent unauthorized course access. Countries with significant adoption of WisdomGarden’s educational platforms, especially in East Asia and regions with high e-learning usage, are at higher risk. This vulnerability highlights the need for strict authorization validation on user-controlled parameters to prevent unauthorized resource access.
AI-Powered Analysis
Technical Analysis
CVE-2026-2997 identifies an Insecure Direct Object Reference (IDOR) vulnerability in the Tronclass product developed by WisdomGarden. The flaw arises from improper authorization checks on a user-controlled parameter related to course invitation codes. Specifically, once an attacker authenticates and obtains a valid course ID, they can modify a request parameter to retrieve the invitation code for that course. This code is intended to be confidential and is used to control access to courses. By exploiting this vulnerability, an attacker can bypass normal authorization mechanisms and join any course without explicit permission. The vulnerability is classified under CWE-639, which pertains to authorization bypass through user-controlled keys. The CVSS v3.1 base score is 5.4, reflecting a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity to a limited extent but does not affect availability. No patches or known exploits are currently documented, indicating that the vulnerability is newly disclosed. The root cause is insufficient validation of user-supplied parameters that control access to sensitive course invitation codes, a common pitfall in web applications managing access to resources. This vulnerability could be leveraged by malicious insiders or external attackers with valid credentials to escalate their access within the e-learning platform.
Potential Impact
The primary impact of CVE-2026-2997 is unauthorized access to courses within the Tronclass platform. Attackers can join courses without proper authorization, potentially gaining access to course materials, discussions, and other sensitive educational content. This could lead to confidentiality breaches of proprietary or sensitive educational information. Integrity may also be affected if unauthorized users can participate in course activities or submit assignments, undermining the trustworthiness of course outcomes. Although availability is not impacted, the breach of access controls could damage the reputation of educational institutions using Tronclass and erode user trust. Organizations relying on Tronclass for secure course management face risks of unauthorized data exposure and potential compliance violations related to data protection regulations. The medium severity score reflects that while the vulnerability is exploitable remotely with low complexity, it requires authenticated access, limiting the attack surface somewhat. However, in environments with many users, the risk of insider threats or credential compromise increases the potential impact.
Mitigation Recommendations
To mitigate CVE-2026-2997, organizations should implement strict server-side authorization checks on all parameters controlling access to course invitation codes. This includes validating that the authenticated user has explicit permission to access the requested course information before disclosing invitation codes. Employing parameter validation and access control mechanisms such as role-based access control (RBAC) or attribute-based access control (ABAC) can help enforce proper authorization. Monitoring and logging access attempts to course invitation codes can aid in detecting suspicious activities. Since no official patches are currently available, administrators should consider restricting access to course invitation code endpoints to trusted users only and applying web application firewalls (WAFs) to detect and block anomalous parameter tampering. Educating users about credential security and enforcing strong authentication can reduce the risk of attackers gaining the necessary privileges to exploit this vulnerability. Finally, WisdomGarden should be engaged to prioritize patch development and timely deployment once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- twcert
- Date Reserved
- 2026-02-23T01:38:26.604Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699bbc2cbe58cf853bf3201f
Added to database: 2/23/2026, 2:32:12 AM
Last enriched: 2/23/2026, 2:46:30 AM
Last updated: 2/23/2026, 7:25:11 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2976: Information Disclosure in FastApiAdmin
MediumCVE-2026-2975: Information Disclosure in FastApiAdmin
MediumCVE-2026-2974: Exposure of Backup File to an Unauthorized Control Sphere in AliasVault App
LowCVE-2026-2971: Cross Site Scripting in a466350665 Smart-SSO
MediumCVE-2026-2970: Deserialization in datapizza-labs datapizza-ai
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.