reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE ID: CVE-2025-24899
CVSS Base Severity: HIGH
CVSS Base Score: 7.1
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Vendor: yogeshojha
Product: rengine
EPSS Score: 0.04% (probability of being exploited)
EPSS Percentile: 11.83% (scored less or equal to compared to others)
EPSS Date: 2025-03-04 (when was this score calculated)