CVE-2025-62376
BaseFortify
Publication date: 2025-10-14
Last updated on: 2025-12-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pwncollege | dojo | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in pwn.college DOJO's /workspace endpoint allows an attacker to access any active Windows VM without proper authorization. It occurs because the view_desktop function retrieves the user via a URL parameter without verifying administrative privileges. An attacker can supply any user ID and arbitrary password to impersonate another user. The function does not validate the password before generating access credentials, enabling the attacker to obtain an iframe URL that grants full access to the target user's Windows VM.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain unauthorized full access to any active Windows VM on the platform. This means they can access and modify data on the Windows machine and also in the home directory of the associated Linux machine via the Z: drive, potentially leading to data theft, data loss, or unauthorized changes.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been patched in commit 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef. Immediate steps include updating the pwn.college DOJO platform to this patched version. No known workarounds exist.