{"api_version":"1","generated_at":"2026-04-28T12:14:18+00:00","cve":"CVE-2025-10539","urls":{"html":"https://cve.report/CVE-2025-10539","api":"https://cve.report/api/cve/CVE-2025-10539.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-10539","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-10539"},"summary":{"title":"Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App","description":"Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.","state":"PUBLISHED","assigner":"SEC-VLab","published_at":"2026-04-28 09:16:16","updated_at":"2026-04-28 09:16:16"},"problem_types":["CWE-295","CWE-296","CWE-494","CWE-295 CWE-295 Improper certificate validation","CWE-296 CWE-296 Improper following of a certificate's chain of trust","CWE-494 CWE-494 Download of code without integrity check"],"metrics":[],"references":[{"url":"https://r.sec-consult.com/desktime","name":"https://r.sec-consult.com/desktime","refsource":"551230f0-3615-47bd-b7cc-93e92e730bbf","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://desktime.com/download","name":"https://desktime.com/download","refsource":"551230f0-3615-47bd-b7cc-93e92e730bbf","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-10539","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-10539","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"DeskTime","product":"DeskTime Time Tracking App","version":"affected 1.3.674 semver","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Daniel Hirschberger, SEC Consult Vulnerability Lab","lang":"en"},{"source":"CNA","value":"Thorger Jansen, SEC Consult Vulnerability Lab","lang":"en"},{"source":"CNA","value":"Tobias Niemann, SEC Consult Vulnerability Lab","lang":"en"},{"source":"CNA","value":"Marius Renner, SEC Consult Vulnerability Lab","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"DeskTime Time Tracking App","vendor":"DeskTime","versions":[{"lessThan":"1.3.674","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Daniel Hirschberger, SEC Consult Vulnerability Lab"},{"lang":"en","type":"finder","value":"Thorger Jansen, SEC Consult Vulnerability Lab"},{"lang":"en","type":"finder","value":"Tobias Niemann, SEC Consult Vulnerability Lab"},{"lang":"en","type":"finder","value":"Marius Renner, SEC Consult Vulnerability Lab"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><span>Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.</span></p>"}],"value":"Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client."}],"impacts":[{"capecId":"CAPEC-187","descriptions":[{"lang":"en","value":"CAPEC-187 Malicious Automated Software Update via Redirection"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-295","description":"CWE-295 Improper certificate validation","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-296","description":"CWE-296 Improper following of a certificate's chain of trust","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-494","description":"CWE-494 Download of code without integrity check","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-28T07:52:23.279Z","orgId":"551230f0-3615-47bd-b7cc-93e92e730bbf","shortName":"SEC-VLab"},"references":[{"tags":["third-party-advisory"],"url":"https://r.sec-consult.com/desktime"},{"tags":["patch"],"url":"https://desktime.com/download"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download<br><br>"}],"value":"The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download"}],"source":{"discovery":"EXTERNAL"},"title":"Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App","x_generator":{"engine":"Vulnogram 1.0.2"}}},"cveMetadata":{"assignerOrgId":"551230f0-3615-47bd-b7cc-93e92e730bbf","assignerShortName":"SEC-VLab","cveId":"CVE-2025-10539","datePublished":"2026-04-28T07:52:23.279Z","dateReserved":"2025-09-16T07:39:47.680Z","dateUpdated":"2026-04-28T07:52:23.279Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-28 09:16:16","lastModifiedDate":"2026-04-28 09:16:16","problem_types":["CWE-295","CWE-296","CWE-494","CWE-295 CWE-295 Improper certificate validation","CWE-296 CWE-296 Improper following of a certificate's chain of trust","CWE-494 CWE-494 Download of code without integrity check"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"10539","Ordinal":"1","Title":"Improper TLS Certificate Validation RCE via Malicious Update in ","CVE":"CVE-2025-10539","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"10539","Ordinal":"1","NoteData":"Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.","Type":"Description","Title":"Improper TLS Certificate Validation RCE via Malicious Update in "}]}}}