reNgine is an automated reconnaissance framework for web applications. An unrestricted project deletion vulnerability allows attackers with specific roles, such as `penetration_tester` or `auditor` to delete all projects in the system. This can lead to a complete system takeover by redirecting the attacker to the onboarding page, where they can add or modify users, including Sys Admins, and configure critical settings like API keys and user preferences. This issue affects all versions up to and including 2.20. Users are advised to monitor the project for future releases which address this issue. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396 | Exploit Vendor Advisory |
https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396 | Exploit Vendor Advisory |
Configurations
History
13 May 2025, 18:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Yogeshojha
Yogeshojha rengine |
|
CPE | cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
References | () https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396 - Exploit, Vendor Advisory |
04 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-04 20:15
Updated : 2025-05-13 18:39
NVD link : CVE-2025-24968
Mitre link : CVE-2025-24968
CVE.ORG link : CVE-2025-24968
JSON object : View
Products Affected
yogeshojha
- rengine
CWE