Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 20 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:yogeshojha:rengine:2.2.0:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yogeshojha
Yogeshojha rengine |
|
| Vendors & Products |
Yogeshojha
Yogeshojha rengine |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration. | |
| Title | reNgine 2.2.0 Authenticated Command Injection via Scan Engine Configuration | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T12:03:34.776Z
Reserved: 2025-12-10T23:46:14.008Z
Link: CVE-2024-58287
Updated: 2025-12-18T19:37:22.275Z
Status : Analyzed
Published: 2025-12-11T22:15:49.217
Modified: 2026-01-20T18:43:16.803
Link: CVE-2024-58287
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:58Z