First published: Tue Feb 04 2025(Updated: )
reNgine is an automated reconnaissance framework for web applications. A stored cross-site scripting (XSS) vulnerability exists in the admin panel's user management functionality. An attacker can exploit this issue by injecting malicious payloads into the username field during user creation. This vulnerability allows unauthorized script execution whenever the admin views or interacts with the affected user entry, posing a significant risk to sensitive admin functionalities. This issue affects all versions up to and including 2.20. Users are advised to monitor the project for future releases which address this issue. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
reNgine | <=2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24967 is classified as a medium severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2025-24967, update reNgine to version 2.21 or later, which mitigates the XSS vulnerability in the admin panel.
CVE-2025-24967 enables attackers to execute arbitrary scripts in the context of a user's browser through stored XSS.
Versions of reNgine up to and including 2.20 are affected by CVE-2025-24967.
Yes, CVE-2025-24967 can be exploited remotely by an attacker with access to inject payloads into the username field in the admin panel.