CVE-2025-24968

reNgine is an automated reconnaissance framework for web applications. An unrestricted project deletion vulnerability allows attackers with specific roles, such as `penetration_tester` or `auditor` to delete all projects in the system. This can lead to a complete system takeover by redirecting the attacker to the onboarding page, where they can add or modify users, including Sys Admins, and configure critical settings like API keys and user preferences. This issue affects all versions up to and including 2.20. Users are advised to monitor the project for future releases which address this issue. There are no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:*

History

13 May 2025, 18:39

Type Values Removed Values Added
CPE cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE NVD-CWE-noinfo
First Time Yogeshojha
Yogeshojha rengine
References () https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396 - () https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396 - Exploit, Vendor Advisory

04 Feb 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-04 20:15

Updated : 2025-05-13 18:39


NVD link : CVE-2025-24968

Mitre link : CVE-2025-24968


JSON object : View

Products Affected

yogeshojha

  • rengine
CWE
NVD-CWE-noinfo CWE-284

Improper Access Control