Skip to main content

CVE-2025-8793: Improper Control of Resource Identifiers in LitmusChaos Litmus

Medium
VulnerabilityCVE-2025-8793cvecve-2025-8793
Published: Sun Aug 10 2025 (08/10/2025, 04:02:06 UTC)
Source: CVE Database V5
Vendor/Project: LitmusChaos
Product: Litmus

Description

A vulnerability classified as problematic was found in LitmusChaos Litmus up to 3.19.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument projectID leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/18/2025, 00:57:17 UTC

Technical Analysis

CVE-2025-8793 is a medium severity vulnerability identified in the LitmusChaos Litmus platform, affecting all versions up to 3.19.0. The vulnerability stems from improper control of resource identifiers, specifically through manipulation of the 'projectID' argument. This flaw allows an attacker to remotely influence resource identifiers without requiring user interaction or elevated privileges beyond low-level privileges. The vulnerability is classified under improper control of resource identifiers, which can lead to unauthorized access or manipulation of resources within the LitmusChaos environment. LitmusChaos is an open-source chaos engineering platform used to test the resilience of cloud-native applications, often deployed in Kubernetes environments. The vulnerability's CVSS 4.0 score is 5.3, indicating a medium impact primarily due to its remote exploitability and low attack complexity, but limited impact on confidentiality, integrity, and availability. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released yet. Although no known exploits are currently active in the wild, public disclosure increases the risk of exploitation attempts. The vulnerability does not require user interaction or authentication, which increases its risk profile. However, the impact is limited by the requirement of low privileges and the vulnerability's scope being confined to resource identifier control within the LitmusChaos platform.

Potential Impact

For European organizations utilizing LitmusChaos for chaos engineering and resilience testing, this vulnerability could allow attackers to manipulate project identifiers remotely, potentially leading to unauthorized access or modification of chaos experiments or related resources. This could disrupt testing workflows, cause inaccurate resilience assessments, or in worst cases, lead to indirect impacts on production environments if chaos experiments are misconfigured or manipulated maliciously. Given the growing adoption of cloud-native technologies and Kubernetes in Europe, organizations relying on LitmusChaos may face operational risks, especially in sectors where continuous testing and reliability are critical, such as finance, telecommunications, and critical infrastructure. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it could be leveraged as part of a broader attack chain or to gain footholds in development or testing environments, which may later be escalated to more severe compromises.

Mitigation Recommendations

Since no official patches or updates have been released by the vendor, European organizations should implement the following specific mitigations: 1) Restrict network access to LitmusChaos management interfaces to trusted internal networks only, using network segmentation and firewall rules. 2) Implement strict access controls and monitoring on the usage of the 'projectID' parameter to detect anomalous or unauthorized requests. 3) Employ runtime application self-protection (RASP) or Web Application Firewalls (WAF) with custom rules to detect and block suspicious manipulation of resource identifiers. 4) Conduct thorough audits of chaos experiment configurations to ensure no sensitive or production-critical resources are exposed or accessible via manipulated identifiers. 5) Monitor public vulnerability disclosures and subscribe to LitmusChaos community channels for any forthcoming patches or official guidance. 6) Consider temporary suspension or isolation of LitmusChaos deployments in high-risk environments until a patch is available. 7) Enhance logging and alerting around LitmusChaos API calls to identify potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T05:34:00.304Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68981d67ad5a09ad0010f9f1

Added to database: 8/10/2025, 4:17:43 AM

Last enriched: 8/18/2025, 12:57:17 AM

Last updated: 9/21/2025, 4:42:34 PM

Views: 38

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats