Skip to main content

CVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor

High
VulnerabilityCVE-2025-59945cvecve-2025-59945cwe-266
Published: Sat Sep 27 2025 (09/27/2025, 01:01:52 UTC)
Source: CVE Database V5
Vendor/Project: Syslifters
Product: sysreptor

Description

SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.

AI-Powered Analysis

AILast updated: 09/27/2025, 01:33:34 UTC

Technical Analysis

CVE-2025-59945 is a high-severity vulnerability affecting Syslifters' sysreptor, a customizable penetration testing reporting platform. The vulnerability exists in versions from 2024.74 up to, but not including, 2025.83. It involves an incorrect privilege assignment (CWE-266) where authenticated users without administrative privileges can escalate their permissions by assigning themselves the 'is_project_admin' role. This privilege escalation flaw enables unauthorized users to read, modify, and delete pentesting projects they are not authorized to access. Since sysreptor is used to manage sensitive penetration testing data, including potentially confidential security assessments and findings, unauthorized access can lead to significant confidentiality and integrity breaches. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low attack complexity. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity but no impact on availability. The issue has been patched in version 2025.83, and no known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Many enterprises and security consultancies in Europe rely on pentest reporting platforms like sysreptor to document and manage security assessments. Unauthorized privilege escalation could allow malicious insiders or compromised user accounts to access sensitive security data, manipulate reports, or delete critical project information. This could undermine trust in security processes, expose vulnerabilities to unauthorized parties, and potentially facilitate further attacks. Additionally, the breach of confidentiality could violate GDPR requirements regarding the protection of personal and sensitive data, leading to regulatory penalties. The integrity loss could also affect compliance with industry standards such as ISO 27001 or PCI DSS, which require secure handling of security assessment data. Since exploitation requires authentication, the threat is more relevant in environments where user accounts are shared, weakly managed, or where credential compromise is possible.

Mitigation Recommendations

European organizations using sysreptor should immediately upgrade to version 2025.83 or later to remediate this vulnerability. Beyond patching, organizations should enforce strict access controls and monitor user permissions regularly to detect unauthorized privilege changes. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise. Audit logs should be enabled and reviewed frequently to identify suspicious activities related to project administration roles. Network segmentation can limit exposure of the sysreptor platform to only trusted internal users. Additionally, organizations should conduct internal security awareness training emphasizing the risks of privilege escalation and the importance of safeguarding credentials. For environments where immediate patching is not feasible, temporarily restricting sysreptor access to highly trusted users and disabling unnecessary accounts can reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-23T14:33:49.506Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d73b6c79aa5c9d08560839

Added to database: 9/27/2025, 1:18:36 AM

Last enriched: 9/27/2025, 1:33:34 AM

Last updated: 9/27/2025, 7:14:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats