CVSS 3.1 Score 8.8 of 10 (high)


Published Jan 1, 2024
Updated: Jan 9, 2024


CVE-2023-50094 is a high-severity vulnerability that affects reNgine versions up to 2.0.2. It allows for OS Command Injection if an attacker has a valid session ID, by inserting shell metacharacters in the "api/tools/waf_detector/?url=" string. The commands are executed with root privileges through subprocess.check_output. The vulnerability has a CVSS score of 8.8, indicating a high potential danger to organizations. To remediate this vulnerability, users should update to a patched version of reNgine that addresses the issue.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-50094 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options