CVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor
SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.
AI Analysis
Technical Summary
CVE-2025-59945 is a high-severity vulnerability affecting Syslifters' sysreptor, a customizable penetration testing reporting platform. The vulnerability exists in versions from 2024.74 up to but not including 2025.83. It involves an incorrect privilege assignment (CWE-266), where authenticated users without administrative privileges can escalate their permissions by assigning themselves the 'is_project_admin' role. This privilege escalation flaw allows unauthorized users to gain administrative access to pentesting projects they are not members of. Consequently, these users can read, modify, and delete sensitive pentesting project data, compromising confidentiality and integrity. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, given the attacker only needs valid user credentials. The flaw has been patched in version 2025.83. The CVSS v3.1 score is 8.1 (high), reflecting the significant impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. This vulnerability is critical for organizations relying on sysreptor to manage sensitive pentest reports, as unauthorized access could lead to exposure or tampering of security assessment data, undermining trust and potentially exposing vulnerabilities to adversaries.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those in sectors with strict data protection regulations such as finance, healthcare, and critical infrastructure. Pentesting reports often contain detailed information about security weaknesses and remediation strategies; unauthorized access or modification could lead to data breaches or sabotage of security efforts. This could result in regulatory penalties under GDPR, reputational damage, and increased risk of follow-on attacks. Additionally, organizations using sysreptor for internal or client-facing pentest reporting may face contractual and compliance issues if sensitive data is compromised. The ability for non-admin users to escalate privileges undermines internal access controls, increasing insider threat risks. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact warrant urgent patching and review of access controls.
Mitigation Recommendations
Organizations should immediately upgrade sysreptor installations to version 2025.83 or later, where the privilege assignment flaw is fixed. Until patching is possible, restrict sysreptor access to trusted users only and monitor user activities for unusual privilege escalations or project access patterns. Implement strict authentication and authorization policies, including multi-factor authentication (MFA) for all users to reduce risk of compromised credentials. Conduct audits of user permissions regularly to detect and revoke unauthorized privilege assignments. Additionally, consider network segmentation to limit sysreptor access to internal networks and use logging and alerting mechanisms to detect suspicious modifications to pentest projects. Educate pentest teams and administrators about the vulnerability and the importance of timely patching and monitoring. Finally, review and update incident response plans to address potential data integrity breaches related to pentest reporting platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor
Description
SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.
AI-Powered Analysis
Technical Analysis
CVE-2025-59945 is a high-severity vulnerability affecting Syslifters' sysreptor, a customizable penetration testing reporting platform. The vulnerability exists in versions from 2024.74 up to but not including 2025.83. It involves an incorrect privilege assignment (CWE-266), where authenticated users without administrative privileges can escalate their permissions by assigning themselves the 'is_project_admin' role. This privilege escalation flaw allows unauthorized users to gain administrative access to pentesting projects they are not members of. Consequently, these users can read, modify, and delete sensitive pentesting project data, compromising confidentiality and integrity. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, given the attacker only needs valid user credentials. The flaw has been patched in version 2025.83. The CVSS v3.1 score is 8.1 (high), reflecting the significant impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. This vulnerability is critical for organizations relying on sysreptor to manage sensitive pentest reports, as unauthorized access could lead to exposure or tampering of security assessment data, undermining trust and potentially exposing vulnerabilities to adversaries.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those in sectors with strict data protection regulations such as finance, healthcare, and critical infrastructure. Pentesting reports often contain detailed information about security weaknesses and remediation strategies; unauthorized access or modification could lead to data breaches or sabotage of security efforts. This could result in regulatory penalties under GDPR, reputational damage, and increased risk of follow-on attacks. Additionally, organizations using sysreptor for internal or client-facing pentest reporting may face contractual and compliance issues if sensitive data is compromised. The ability for non-admin users to escalate privileges undermines internal access controls, increasing insider threat risks. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact warrant urgent patching and review of access controls.
Mitigation Recommendations
Organizations should immediately upgrade sysreptor installations to version 2025.83 or later, where the privilege assignment flaw is fixed. Until patching is possible, restrict sysreptor access to trusted users only and monitor user activities for unusual privilege escalations or project access patterns. Implement strict authentication and authorization policies, including multi-factor authentication (MFA) for all users to reduce risk of compromised credentials. Conduct audits of user permissions regularly to detect and revoke unauthorized privilege assignments. Additionally, consider network segmentation to limit sysreptor access to internal networks and use logging and alerting mechanisms to detect suspicious modifications to pentest projects. Educate pentest teams and administrators about the vulnerability and the importance of timely patching and monitoring. Finally, review and update incident response plans to address potential data integrity breaches related to pentest reporting platforms.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-23T14:33:49.506Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d73b6c79aa5c9d08560839
Added to database: 9/27/2025, 1:18:36 AM
Last enriched: 10/5/2025, 12:58:42 AM
Last updated: 12/26/2025, 7:23:04 PM
Views: 112
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.