Vulnerability Description
ReNgine thru 2.2.0 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability in the Vulnerabilities module. When scanning a target with an XSS payload, the unsanitized payload is rendered in the ReNgine web UI, resulting in arbitrary JavaScript execution in the victim's browser. This can be abused to steal session cookies, perform unauthorized actions, or compromise the ReNgine administrator's account.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yogeshojha | Rengine | <= 2.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/AmalJafarzade/CVE-2025-61319/ExploitThird Party Advisory
- https://github.com/yogeshojha/rengineProduct
FAQ
What is CVE-2025-61319?
CVE-2025-61319 is a vulnerability with a CVSS score of 6.1 (MEDIUM). ReNgine thru 2.2.0 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability in the Vulnerabilities module. When scanning a target with an XSS payload, the unsanitized payload is rendered in ...
How severe is CVE-2025-61319?
CVE-2025-61319 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61319?
Check the references section above for vendor advisories and patch information. Affected products include: Yogeshojha Rengine.