Company Details
wondershare-recoverit
6
409
5112
wondershare.com
0
WON_1130143
In-progress


Wondershare Recoverit Company CyberSecurity Posture
wondershare.comRecovers deleted or lost photos, videos, documents, email files, etc. Recovers data from hard drive, SD card, external USB drives, etc. Recovers lost data from formatted, RAW, or damaged partitions. Recovers 100 MB of files for free without subscription requirements.
Company Details
wondershare-recoverit
6
409
5112
wondershare.com
0
WON_1130143
In-progress
Between 700 and 749

Wondershare Recoverit Global Score (TPRM)XXXX

Description: Cybersecurity researchers from Trend Micro uncovered two critical authentication bypass vulnerabilities (CVE-2025-10643 and CVE-2025-10644, CVSS scores 9.1 and 9.4) in Wondershare RepairIt, an AI-powered data repair tool. The flaws stemmed from overly permissive cloud storage tokens embedded in the application’s code, granting read/write access to sensitive data including user-uploaded images/videos, AI models, software binaries, source code, and container images all stored unencrypted. Exploitation could enable attackers to bypass authentication, tamper with AI models or executables, and launch supply chain attacks via vendor-signed updates or malicious AI model downloads. The exposed data included customer private information, intellectual property (e.g., patents, source code), and proprietary AI models, risking intellectual property theft, regulatory penalties, and severe erosion of consumer trust. Trend Micro’s responsible disclosure via the Zero Day Initiative (ZDI) in April 2025 went unanswered, leaving users vulnerable. The incident highlights critical gaps in DevSecOps practices, where rushed innovation overlooked security implications, enabling potential large-scale abuse of user data and system integrity.


No incidents recorded for Wondershare Recoverit in 2026.
No incidents recorded for Wondershare Recoverit in 2026.
No incidents recorded for Wondershare Recoverit in 2026.
Wondershare Recoverit cyber incidents detection timeline including parent company and subsidiaries

Recovers deleted or lost photos, videos, documents, email files, etc. Recovers data from hard drive, SD card, external USB drives, etc. Recovers lost data from formatted, RAW, or damaged partitions. Recovers 100 MB of files for free without subscription requirements.


SS&C is a leading global provider of mission-critical, cloud-based software and solutions for the financial and healthcare industries. Named to the Fortune 1000 list as a top U.S. company based on revenue, SS&C (NASDAQ: SSNC) is a trusted provider to more than 22,000 financial services and healthcar
Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right person at the right mo

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and

Cisco is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities

At Expedia Group (NASDAQ: EXPE), we believe travel is a force for good – it opens minds, builds connections, and bridges divides. We create transformative tech that enables unforgettable experiences for all travelers, everywhere. Our trusted family of brands are known and loved by millions, and we p

ByteDance is a global incubator of platforms at the cutting edge of commerce, content, entertainment and enterprise services - over 2.5bn people interact with ByteDance products including TikTok. Creation is the core of ByteDance's purpose. Our products are built to help imaginations thrive. This i

Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite their siloed data, easily discover and securely share governed data, and execute diverse analy

We're a global online visual communications platform on a mission to empower the world to design. Featuring a simple drag-and-drop user interface and a vast range of templates ranging from presentations, documents, websites, social media graphics, posters, apparel to videos, plus a huge library of f
.png)
To avoid losing your memorable photos, you must have a reliable photo recovery tool for Mac.
Wondershare Recoverit is a feature-packed data recovery tool that has the ability to completely recover lost files, videos, and photos from...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Wondershare Recoverit is https://recoverit.wondershare.com/data-recovery-services-or-software.html?utm_source=Post&utm_medium=Facebook&utm_campaign=RILF-staywithRecoverit.
According to Rankiteo, Wondershare Recoverit’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, Wondershare Recoverit currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Wondershare Recoverit has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Wondershare Recoverit is not certified under SOC 2 Type 1.
According to Rankiteo, Wondershare Recoverit does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Wondershare Recoverit is not listed as GDPR compliant.
According to Rankiteo, Wondershare Recoverit does not currently maintain PCI DSS compliance.
According to Rankiteo, Wondershare Recoverit is not compliant with HIPAA regulations.
According to Rankiteo,Wondershare Recoverit is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Wondershare Recoverit operates primarily in the Software Development industry.
Wondershare Recoverit employs approximately 6 people worldwide.
Wondershare Recoverit presently has no subsidiaries across any sectors.
Wondershare Recoverit’s official LinkedIn profile has approximately 409 followers.
Wondershare Recoverit is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Wondershare Recoverit does not have a profile on Crunchbase.
Yes, Wondershare Recoverit maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wondershare-recoverit.
As of January 24, 2026, Rankiteo reports that Wondershare Recoverit has experienced 1 cybersecurity incidents.
Wondershare Recoverit has an estimated 28,180 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with no (vendor unresponsive), and third party assistance with trend micro (disclosure via zero day initiative), and containment measures with users advised to restrict interaction with wondershare repairit, and communication strategy with public disclosure by trend micro, communication strategy with media coverage..
Title: Critical Authentication Bypass Vulnerabilities in Wondershare RepairIt Exposing User Data and AI Model Tampering Risks
Description: Cybersecurity researchers at Trend Micro disclosed two critical-rated authentication bypass vulnerabilities (CVE-2025-10643 and CVE-2025-10644) in Wondershare RepairIt, an AI-powered data repair and photo editing application. The flaws stem from overly permissive cloud access tokens embedded in the application’s code, granting read/write access to sensitive cloud storage without encryption. Successful exploitation could bypass authentication, enable supply chain attacks via tampered AI models or executables, and expose user data (including images, videos, source code, and container images). The vulnerabilities also contradict Wondershare’s privacy policy, as the company was found to collect and leak private user data due to weak DevSecOps practices. Trend Micro responsibly disclosed the issues in April 2025 via its Zero Day Initiative (ZDI), but Wondershare has not responded or issued a fix. Users are advised to restrict interaction with the product until patches are available. The incident highlights broader risks in AI/ML supply chains, including model tampering, intellectual property theft, regulatory penalties, and erosion of consumer trust.
Date Publicly Disclosed: 2025-05
Type: Authentication Bypass
Attack Vector: NetworkMisconfigured Cloud StorageEmbedded Overly Permissive Tokens
Motivation: Data TheftSupply Chain CompromiseAI Model ManipulationIntellectual Property Theft
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: User-uploaded images/videos, Ai models, Software binaries, Container images, Scripts, Company source code, Personally identifiable information (pii)
Systems Affected: Wondershare RepairIt applicationCloud storage (Azure/S3-like)AI model repositoriesContainer registries
Operational Impact: Supply chain disruptionLoss of customer trustPotential regulatory penalties
Brand Reputation Impact: High (erosion of consumer trust due to privacy policy violations and data leakage)
Legal Liabilities: Potential GDPR/CCPA violationsRegulatory fines
Identity Theft Risk: High (unencrypted PII exposure)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are User-Generated Content (Images/Videos), Ai Models, Software Binaries, Container Images, Scripts, Source Code, Pii and .

Entity Name: Wondershare
Entity Type: Software Vendor
Industry: Technology (Multimedia & AI Tools)
Location: Shenzhen, China (HQ)
Customers Affected: Global user base (exact number undisclosed)

Incident Response Plan Activated: No (vendor unresponsive)
Third Party Assistance: Trend Micro (Disclosure Via Zero Day Initiative).
Containment Measures: Users advised to restrict interaction with Wondershare RepairIt
Communication Strategy: Public disclosure by Trend MicroMedia coverage
Incident Response Plan: The company's incident response plan is described as No (vendor unresponsive).
Third-Party Assistance: The company involves third-party assistance in incident response through Trend Micro (disclosure via Zero Day Initiative), .

Type of Data Compromised: User-generated content (images/videos), Ai models, Software binaries, Container images, Scripts, Source code, Pii
Sensitivity of Data: High (includes proprietary AI models, source code, and unencrypted PII)
Data Exfiltration: Potential (no confirmed exfiltration reported, but exposure enables abuse)
Data Encryption: None (data stored in plaintext)
File Types Exposed: ImagesVideosExecutablesContainer images (Docker)ScriptsSource code files
Personally Identifiable Information: Yes (user-uploaded content may include PII)
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by users advised to restrict interaction with wondershare repairit and .

Regulations Violated: Potential GDPR (EU), CCPA (California), Other regional data protection laws,

Lessons Learned: Embedding overly permissive cloud access tokens in application code introduces critical risks., Lack of encryption for sensitive data in cloud storage exacerbates exposure., Weak DevSecOps practices can lead to privacy policy violations and supply chain vulnerabilities., AI/ML supply chains require rigorous security controls to prevent model tampering and downstream attacks., Responsible disclosure does not guarantee vendor responsiveness; users may need to take proactive mitigation steps.

Recommendations: Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest., Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities., Monitor cloud storage and container registries for unauthorized access or tampering., Users should avoid using Wondershare RepairIt until patches are released and verified., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Adopt security best practices for MCP servers, including authentication and credential protection.
Key Lessons Learned: The key lessons learned from past incidents are Embedding overly permissive cloud access tokens in application code introduces critical risks.,Lack of encryption for sensitive data in cloud storage exacerbates exposure.,Weak DevSecOps practices can lead to privacy policy violations and supply chain vulnerabilities.,AI/ML supply chains require rigorous security controls to prevent model tampering and downstream attacks.,Responsible disclosure does not guarantee vendor responsiveness; users may need to take proactive mitigation steps.

Source: Trend Micro Research Blog
URL: https://www.trendmicro.com/en_us/what-is/zero-day-initiative.html
Date Accessed: 2025-05

Source: Kaspersky PoC on MCP Server Risks

Source: Palo Alto Networks Unit 42 Report on AI Code Assistant Vulnerabilities
Date Accessed: 2025-05

Source: Checkmarx Research on 'Lies-in-the-Loop' (LitL) Attacks
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Trend Micro Research BlogUrl: https://www.trendmicro.com/en_us/what-is/zero-day-initiative.htmlDate Accessed: 2025-05, and Source: Kaspersky PoC on MCP Server Risks, and Source: Palo Alto Networks Unit 42 Report on AI Code Assistant VulnerabilitiesDate Accessed: 2025-05, and Source: Checkmarx Research on 'Lies-in-the-Loop' (LitL) Attacks.

Investigation Status: Ongoing (vendor unresponsive; third-party research disclosed)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure By Trend Micro and Media Coverage.

Stakeholder Advisories: Trend Micro Advisory To Restrict Use Of Wondershare Repairit.
Customer Advisories: Public warning issued via media and security blogs
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Trend Micro Advisory To Restrict Use Of Wondershare Repairit, Public Warning Issued Via Media And Security Blogs and .

Root Causes: Overly Permissive Cloud Access Tokens Embedded In Application Code., Lack Of Encryption For Sensitive Data In Cloud Storage., Weak Devsecops Practices (E.G., Hardcoded Credentials, Insufficient Access Controls)., Inadequate Vendor Response To Responsible Disclosure.,
Corrective Actions: Token Rotation And Least-Privilege Access Enforcement (Pending Vendor Action)., Data Encryption Implementation For Cloud Storage., Security Audit Of Ci/Cd Pipelines And Third-Party Dependencies., User Awareness Campaigns On Supply Chain Risks In Ai/Ml Tools.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Trend Micro (Disclosure Via Zero Day Initiative), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Token Rotation And Least-Privilege Access Enforcement (Pending Vendor Action)., Data Encryption Implementation For Cloud Storage., Security Audit Of Ci/Cd Pipelines And Third-Party Dependencies., User Awareness Campaigns On Supply Chain Risks In Ai/Ml Tools., .
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-05.
Most Significant Data Compromised: The most significant data compromised in an incident were User-uploaded images/videos, AI models, Software binaries, Container images, Scripts, Company source code, Personally Identifiable Information (PII) and .
Most Significant System Affected: The most significant system affected in an incident was Wondershare RepairIt applicationCloud storage (Azure/S3-like)AI model repositoriesContainer registries.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was trend micro (disclosure via zero day initiative), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Users advised to restrict interaction with Wondershare RepairIt.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were User-uploaded images/videos, Company source code, AI models, Personally Identifiable Information (PII), Container images, Software binaries and Scripts.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Responsible disclosure does not guarantee vendor responsiveness; users may need to take proactive mitigation steps.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Users should avoid using Wondershare RepairIt until patches are released and verified., Adopt security best practices for MCP servers, including authentication and credential protection., Organizations should assess third-party AI/ML tools for supply chain risks before deployment., Monitor cloud storage and container registries for unauthorized access or tampering., Immediately revoke and rotate all embedded cloud access tokens in Wondershare RepairIt., Implement least-privilege access controls for cloud storage and enforce encryption for data at rest. and Conduct a thorough security audit of DevSecOps pipelines to identify and remediate similar vulnerabilities..
Most Recent Source: The most recent source of information about an incident are Checkmarx Research on 'Lies-in-the-Loop' (LitL) Attacks, Palo Alto Networks Unit 42 Report on AI Code Assistant Vulnerabilities, Trend Micro Research Blog and Kaspersky PoC on MCP Server Risks.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.trendmicro.com/en_us/what-is/zero-day-initiative.html .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (vendor unresponsive; third-party research disclosed).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Trend Micro advisory to restrict use of Wondershare RepairIt, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Public warning issued via media and security blogs.
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.