Rapid7 AppSpider Pro versions below 7.5.021 suffer from a project name validation vulnerability, whereby an attacker can change the project name directly in the configuration file to a name that already exists. This issue stems from a lack of effective verification of the uniqueness of project names when editing them outside the application in affected versions. This vulnerability was remediated in version 7.5.021 of the product.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Description Rapid7 AppSpider Pro versions below 7.5.021 suffer from a project name validation vulnerability, whereby an attacker can change the project name directly in the configuration file to a name that already exists. This issue stems from a lack of effective verification of the uniqueness of project names when editing them outside the application in affected versions. This vulnerability was remediated in version 7.5.021 of the product.
Title Rapid7 AppSpider Project Name Validation Bypass
Weaknesses CWE-20
CWE-345
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-09-30T20:33:45.909Z

Reserved: 2025-09-30T17:32:18.535Z

Link: CVE-2025-11195

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-30T18:15:49.090

Modified: 2025-09-30T18:15:49.090

Link: CVE-2025-11195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.