Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor

0
High
VulnerabilityCVE-2025-59945cvecve-2025-59945cwe-266
Published: Sat Sep 27 2025 (09/27/2025, 01:01:52 UTC)
Source: CVE Database V5
Vendor/Project: Syslifters
Product: sysreptor

Description

SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:58:42 UTC

Technical Analysis

CVE-2025-59945 is a high-severity vulnerability affecting Syslifters' sysreptor, a customizable penetration testing reporting platform. The vulnerability exists in versions from 2024.74 up to but not including 2025.83. It involves an incorrect privilege assignment (CWE-266), where authenticated users without administrative privileges can escalate their permissions by assigning themselves the 'is_project_admin' role. This privilege escalation flaw allows unauthorized users to gain administrative access to pentesting projects they are not members of. Consequently, these users can read, modify, and delete sensitive pentesting project data, compromising confidentiality and integrity. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, given the attacker only needs valid user credentials. The flaw has been patched in version 2025.83. The CVSS v3.1 score is 8.1 (high), reflecting the significant impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. This vulnerability is critical for organizations relying on sysreptor to manage sensitive pentest reports, as unauthorized access could lead to exposure or tampering of security assessment data, undermining trust and potentially exposing vulnerabilities to adversaries.

Potential Impact

For European organizations, the impact of this vulnerability is substantial, especially for those in sectors with strict data protection regulations such as finance, healthcare, and critical infrastructure. Pentesting reports often contain detailed information about security weaknesses and remediation strategies; unauthorized access or modification could lead to data breaches or sabotage of security efforts. This could result in regulatory penalties under GDPR, reputational damage, and increased risk of follow-on attacks. Additionally, organizations using sysreptor for internal or client-facing pentest reporting may face contractual and compliance issues if sensitive data is compromised. The ability for non-admin users to escalate privileges undermines internal access controls, increasing insider threat risks. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact warrant urgent patching and review of access controls.

Mitigation Recommendations

Organizations should immediately upgrade sysreptor installations to version 2025.83 or later, where the privilege assignment flaw is fixed. Until patching is possible, restrict sysreptor access to trusted users only and monitor user activities for unusual privilege escalations or project access patterns. Implement strict authentication and authorization policies, including multi-factor authentication (MFA) for all users to reduce risk of compromised credentials. Conduct audits of user permissions regularly to detect and revoke unauthorized privilege assignments. Additionally, consider network segmentation to limit sysreptor access to internal networks and use logging and alerting mechanisms to detect suspicious modifications to pentest projects. Educate pentest teams and administrators about the vulnerability and the importance of timely patching and monitoring. Finally, review and update incident response plans to address potential data integrity breaches related to pentest reporting platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-23T14:33:49.506Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d73b6c79aa5c9d08560839

Added to database: 9/27/2025, 1:18:36 AM

Last enriched: 10/5/2025, 12:58:42 AM

Last updated: 11/11/2025, 2:32:33 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats