CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-24899: Disclosure of Sensitive User Information via API in reNgine

7.1 CVSS

Description

reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Classification

CVE ID: CVE-2025-24899

CVSS Base Severity: HIGH

CVSS Base Score: 7.1

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products

Vendor: yogeshojha

Product: rengine

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.83% (scored less or equal to compared to others)

EPSS Date: 2025-03-04 (when was this score calculated)

References

https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38
https://github.com/yogeshojha/rengine/commit/a658b8519f1a3347634b04733cf91ed933af1f99

Timeline