- Description
- reNgine is an automated reconnaissance framework for web applications. An unrestricted project deletion vulnerability allows attackers with specific roles, such as `penetration_tester` or `auditor` to delete all projects in the system. This can lead to a complete system takeover by redirecting the attacker to the onboarding page, where they can add or modify users, including Sys Admins, and configure critical settings like API keys and user preferences. This issue affects all versions up to and including 2.20. Users are advised to monitor the project for future releases which address this issue. There are no known workarounds.
- Source
- security-advisories@github.com
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-284
- Hype score
- Not currently trending
CVE-2025-24968 Unauthenticated Project Deletion Vulnerability in reNgine Reconnaissance Framework https://t.co/F627JipEWV
@VulmonFeeds
5 Feb 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-24968: HIGH] Warning: Vulnerability in reNgine allows deletion of all projects, leading to system takeover. Patch in version 2.21. Ensure security by updating promptly. #cybersecurity#cybersecurity,#vulnerability https://t.co/7W17p9cFeb https://t.co/Y7aVsfbYOa
@CveFindCom
4 Feb 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes