Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-3980 | reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 13 May 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yogeshojha
Yogeshojha rengine |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yogeshojha
Yogeshojha rengine |
|
| Metrics |
cvssV3_1
|
Wed, 12 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Disclosure of Sensitive User Information via API in reNgine | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T20:51:25.976Z
Reserved: 2025-01-27T15:32:29.452Z
Link: CVE-2025-24899
Updated: 2025-02-12T20:42:02.166Z
Status : Analyzed
Published: 2025-02-03T21:15:15.703
Modified: 2025-05-13T19:23:48.953
Link: CVE-2025-24899
No data.
OpenCVE Enrichment
No data.
EUVD