First published: Mon Feb 03 2025(Updated: )
reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
reNgine | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24899 is considered a high severity vulnerability due to its potential for insider attacks that can compromise sensitive information.
To fix CVE-2025-24899, update reNgine to version 2.2.1 or later, which addresses the vulnerability.
CVE-2025-24899 affects all users of reNgine version up to 2.2.0, including Auditors, Penetration Testers, and Sys Admins.
CVE-2025-24899 allows an insider attacker to extract sensitive user information stored within the reNgine application.
Organizations using reNgine should monitor for unauthorized access and update to the fixed version to mitigate risks associated with CVE-2025-24899.