CVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor
SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.
AI Analysis
Technical Summary
CVE-2025-59945 is a high-severity vulnerability affecting Syslifters' sysreptor, a customizable penetration testing reporting platform. The vulnerability exists in versions from 2024.74 up to but not including 2025.83. It involves an incorrect privilege assignment (CWE-266), where authenticated users without administrative privileges can escalate their permissions by assigning themselves the 'is_project_admin' role. This privilege escalation flaw allows unauthorized users to gain administrative access to pentesting projects they are not members of. Consequently, these users can read, modify, and delete sensitive pentesting project data, compromising confidentiality and integrity. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, given the attacker only needs valid user credentials. The flaw has been patched in version 2025.83. The CVSS v3.1 score is 8.1 (high), reflecting the significant impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. This vulnerability is critical for organizations relying on sysreptor to manage sensitive pentest reports, as unauthorized access could lead to exposure or tampering of security assessment data, undermining trust and potentially exposing vulnerabilities to adversaries.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those in sectors with strict data protection regulations such as finance, healthcare, and critical infrastructure. Pentesting reports often contain detailed information about security weaknesses and remediation strategies; unauthorized access or modification could lead to data breaches or sabotage of security efforts. This could result in regulatory penalties under GDPR, reputational damage, and increased risk of follow-on attacks. Additionally, organizations using sysreptor for internal or client-facing pentest reporting may face contractual and compliance issues if sensitive data is compromised. The ability for non-admin users to escalate privileges undermines internal access controls, increasing insider threat risks. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact warrant urgent patching and review of access controls.
Mitigation Recommendations
Organizations should immediately upgrade sysreptor installations to version 2025.83 or later, where the privilege assignment flaw is fixed. Until patching is possible, restrict sysreptor access to trusted users only and monitor user activities for unusual privilege escalations or project access patterns. Implement strict authentication and authorization policies, including multi-factor authentication (MFA) for all users to reduce risk of compromised credentials. Conduct audits of user permissions regularly to detect and revoke unauthorized privilege assignments. Additionally, consider network segmentation to limit sysreptor access to internal networks and use logging and alerting mechanisms to detect suspicious modifications to pentest projects. Educate pentest teams and administrators about the vulnerability and the importance of timely patching and monitoring. Finally, review and update incident response plans to address potential data integrity breaches related to pentest reporting platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor
Description
SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.
AI-Powered Analysis
Technical Analysis
CVE-2025-59945 is a high-severity vulnerability affecting Syslifters' sysreptor, a customizable penetration testing reporting platform. The vulnerability exists in versions from 2024.74 up to but not including 2025.83. It involves an incorrect privilege assignment (CWE-266), where authenticated users without administrative privileges can escalate their permissions by assigning themselves the 'is_project_admin' role. This privilege escalation flaw allows unauthorized users to gain administrative access to pentesting projects they are not members of. Consequently, these users can read, modify, and delete sensitive pentesting project data, compromising confidentiality and integrity. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, given the attacker only needs valid user credentials. The flaw has been patched in version 2025.83. The CVSS v3.1 score is 8.1 (high), reflecting the significant impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. This vulnerability is critical for organizations relying on sysreptor to manage sensitive pentest reports, as unauthorized access could lead to exposure or tampering of security assessment data, undermining trust and potentially exposing vulnerabilities to adversaries.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those in sectors with strict data protection regulations such as finance, healthcare, and critical infrastructure. Pentesting reports often contain detailed information about security weaknesses and remediation strategies; unauthorized access or modification could lead to data breaches or sabotage of security efforts. This could result in regulatory penalties under GDPR, reputational damage, and increased risk of follow-on attacks. Additionally, organizations using sysreptor for internal or client-facing pentest reporting may face contractual and compliance issues if sensitive data is compromised. The ability for non-admin users to escalate privileges undermines internal access controls, increasing insider threat risks. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact warrant urgent patching and review of access controls.
Mitigation Recommendations
Organizations should immediately upgrade sysreptor installations to version 2025.83 or later, where the privilege assignment flaw is fixed. Until patching is possible, restrict sysreptor access to trusted users only and monitor user activities for unusual privilege escalations or project access patterns. Implement strict authentication and authorization policies, including multi-factor authentication (MFA) for all users to reduce risk of compromised credentials. Conduct audits of user permissions regularly to detect and revoke unauthorized privilege assignments. Additionally, consider network segmentation to limit sysreptor access to internal networks and use logging and alerting mechanisms to detect suspicious modifications to pentest projects. Educate pentest teams and administrators about the vulnerability and the importance of timely patching and monitoring. Finally, review and update incident response plans to address potential data integrity breaches related to pentest reporting platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-23T14:33:49.506Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d73b6c79aa5c9d08560839
Added to database: 9/27/2025, 1:18:36 AM
Last enriched: 10/5/2025, 12:58:42 AM
Last updated: 11/11/2025, 2:32:33 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
OWASP Highlights Supply Chain Risks in New Top 10 List
HighCVE-2025-42940: CWE-787: Out-of-bounds Write in SAP_SE SAP CommonCryptoLib
HighCVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)
MediumCVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java
MediumCVE-2025-42899: CWE-862: Missing Authorization in SAP_SE SAP S4CORE (Manage Journal Entries)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.