Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-61319 PoC — reNgine 安全漏洞

Source
Associated Vulnerability
Title:reNgine 安全漏洞 (CVE-2025-61319)
Description:reNgine是Yogesh Ojha个人开发者的一个用于 Web 应用程序的自动侦察框架。专注于通过引擎、侦察数据关联和组织、持续监控、由数据库和简单而直观的用户界面支持的高度可配置的流线型侦察过程。 reNgine 2.2.0及之前版本存在安全漏洞,该漏洞源于Vulnerabilities模块未清理XSS有效载荷,可能导致存储型跨站脚本攻击。
Description
Stored XSS in ReNgine <= 2.2.0 — public disclosure
Readme
# CVE-2025-61319: Stored XSS in ReNgine <= 2.2.0

**Discovered by:** Amal J
**Vendor:** ReNgine  
**CVE ID:** CVE-2025-61319  
**Status:** RESERVED (Public reference added: pending MITRE update)

---

## Description
A **Stored Cross-Site Scripting (XSS)** vulnerability exists in **ReNgine <= 2.2.0** within the Vulnerabilities module.  
When a target is scanned with a malicious payload, the payload is rendered unsanitized in the ReNgine web UI, resulting in arbitrary JavaScript execution in the administrator’s browser.

---

## Impact
- Session hijacking  
- UI compromise  
- Unauthorized actions on admin session

---

## Proof of Concept (PoC)
1. Scan a URL with payload:
?param="><svg onload=confirm('xss')>
2. After scan completion, open the Vulnerabilities tab in ReNgine and view results.  
3. The payload executes in the admin's browser context.

---

## Affected versions
- ReNgine <= 2.2.0

---

## Remediation
Sanitize and escape user-supplied input before rendering scan results.  
Implement proper HTML encoding for user-controlled output in the Vulnerabilities tab.

---

## References
- [Official ReNgine Repository](https://github.com/yogeshojha/rengine)
File Snapshot

[4.0K] /data/pocs/55bb4115754bf780e9520213ca8fe978adae5e54 └── [1.2K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.