CVE-2025-24899

reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-02-03 21:15

Updated : 2025-05-13 19:23


NVD link : CVE-2025-24899

Mitre link : CVE-2025-24899

CVE.ORG link : CVE-2025-24899


JSON object : View

Products Affected

yogeshojha

  • rengine
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo