SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 27 Sep 2025 01:15:00 +0000

Type Values Removed Values Added
Description SysReptor is a fully customizable pentest reporting platform. In versions from 2024.74 to before 2025.83, authenticated and unprivileged (non-admin) users can assign the is_project_admin permission to their own user. This allows users to read, modify and delete pentesting projects they are not members of and are therefore not supposed to access. This issue has been patched in version 2025.83.
Title SysReptor Susceptible to Privilege Escalation by Authenticated Users
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-27T01:01:52.330Z

Reserved: 2025-09-23T14:33:49.506Z

Link: CVE-2025-59945

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-27T01:15:44.073

Modified: 2025-09-27T01:15:44.073

Link: CVE-2025-59945

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.