CVE-2025-10719

4.3 MEDIUM

📋 TL;DR

CVE-2025-10719 is an Insecure Direct Object Reference vulnerability in Tronclass by WisdomGarden that allows authenticated users to access other users' files by modifying parameters. This affects all Tronclass deployments where users have regular privileges. The vulnerability enables unauthorized access to potentially sensitive user data.

💻 Affected Systems

Products:
  • Tronclass Learning Management System
Versions: All versions prior to patch
Operating Systems: Any OS running Tronclass
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Tronclass deployments with regular user accounts. Requires authentication but not administrative privileges.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access and exfiltrate sensitive user files including personal documents, assignments, and confidential materials, leading to data breaches and privacy violations.

🟠

Likely Case

Malicious users accessing other users' course materials, assignments, or personal files, potentially enabling academic dishonesty or harassment.

🟢

If Mitigated

Limited access to non-sensitive files or detection of anomalous access patterns before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and parameter manipulation. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with WisdomGarden for specific patched version

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10397-49db1-2.html

Restart Required: No

Instructions:

1. Contact WisdomGarden for the security patch. 2. Apply the patch to your Tronclass installation. 3. Verify proper access controls are functioning.

🔧 Temporary Workarounds

Implement Access Control Validation

all

Add server-side validation to ensure users can only access their own files

🧯 If You Can't Patch

  • Implement strict file access logging and monitoring for anomalous patterns
  • Segment user data and implement additional authentication checks for file access

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can access other users' files by modifying file ID parameters in requests

Check Version:

Check Tronclass version in admin panel or contact WisdomGarden support

Verify Fix Applied:

Verify that parameter manipulation no longer allows access to unauthorized user files

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file access attempts from single user
  • User accessing files with IDs not belonging to them
  • Unusual file download patterns

Network Indicators:

  • HTTP requests with manipulated file ID parameters
  • Unusual file transfer volumes from user accounts

SIEM Query:

source="tronclass" AND (event="file_access" AND user_id!=file_owner_id)

🔗 References

📤 Share & Export