Description
reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
INFO
Published Date :
2025-02-03T21:01:31.624Z
Last Modified :
2025-02-12T20:51:25.976Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-24899 vulnerability.
| Vendors | Products |
|---|---|
| Yogeshojha |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-24899.