First published: Mon Feb 03 2025(Updated: )
reNgine is an automated reconnaissance framework for web applications. In affected versions a user can inject commands via the nmap_cmd parameters. This issue has been addressed in commit `c28e5c8d` and is expected in the next versioned release. Users are advised to filter user input and monitor the project for a new release.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
reNgine | <next versioned release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24962 is considered a moderate severity vulnerability due to the potential for command injection via user input.
To fix CVE-2025-24962, users should update to the next versioned release of reNgine, which includes the necessary security patches.
The impact of CVE-2025-24962 allows attackers to execute arbitrary commands through the nmap_cmd parameter if proper validation is not implemented.
CVE-2025-24962 affects all versions of reNgine prior to the next versioned release that addresses this vulnerability.
Developers and users of reNgine should be concerned about CVE-2025-24962, especially those who handle untrusted user input.