Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00025}

epss

{'score': 0.00028}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00025}


Fri, 11 Jul 2025 04:15:00 +0000

Type Values Removed Values Added
Metrics epss

{}


Thu, 10 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Jul 2025 19:00:00 +0000

Type Values Removed Values Added
Description Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
First Time appeared Trendmicro
Trendmicro password Manager
Weaknesses CWE-64
CPEs cpe:2.3:a:trendmicro:password_manager:5.8.0.1330:*:*:*:*:*:*:*
Vendors & Products Trendmicro
Trendmicro password Manager
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trendmicro

Published:

Updated: 2025-07-11T03:55:32.006Z

Reserved: 2025-06-19T15:06:34.443Z

Link: CVE-2025-52837

cve-icon Vulnrichment

Updated: 2025-07-10T19:07:43.416Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-10T19:15:25.870

Modified: 2025-07-15T13:14:49.980

Link: CVE-2025-52837

cve-icon Redhat

No data.