CVE-2025-52837

Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*

History

03 Oct 2025, 00:48

Type Values Removed Values Added
CWE CWE-59
References () https://helpcenter.trendmicro.com/en-us/article/TMKA-12946 - () https://helpcenter.trendmicro.com/en-us/article/TMKA-12946 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-25-586/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-586/ - Third Party Advisory
CPE cpe:2.3:a:trendmicro:password_manager:*:*:*:*:*:windows:*:*
First Time Trendmicro
Trendmicro password Manager

15 Jul 2025, 13:14

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 19:15

Updated : 2025-10-03 00:48


NVD link : CVE-2025-52837

Mitre link : CVE-2025-52837

CVE.ORG link : CVE-2025-52837


JSON object : View

Products Affected

trendmicro

  • password_manager
CWE
CWE-64

Windows Shortcut Following (.LNK)

CWE-59

Improper Link Resolution Before File Access ('Link Following')