reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.
History

Tue, 20 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yogeshojha:rengine:2.2.0:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Yogeshojha
Yogeshojha rengine
Vendors & Products Yogeshojha
Yogeshojha rengine

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.
Title reNgine 2.2.0 Authenticated Command Injection via Scan Engine Configuration
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-18T19:37:26.186Z

Reserved: 2025-12-10T23:46:14.008Z

Link: CVE-2024-58287

cve-icon Vulnrichment

Updated: 2025-12-18T19:37:22.275Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T22:15:49.217

Modified: 2026-01-20T18:43:16.803

Link: CVE-2024-58287

cve-icon Redhat

No data.