Skip to main content

CVE-2025-8795: Improper Access Controls in LitmusChaos Litmus

Medium
VulnerabilityCVE-2025-8795cvecve-2025-8795
Published: Sun Aug 10 2025 (08/10/2025, 05:32:06 UTC)
Source: CVE Database V5
Vendor/Project: LitmusChaos
Product: Litmus

Description

A vulnerability, which was classified as critical, was found in LitmusChaos Litmus up to 3.19.0. This affects an unknown part of the file /auth/login. The manipulation of the argument projectID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/10/2025, 06:02:45 UTC

Technical Analysis

CVE-2025-8795 is a vulnerability identified in LitmusChaos Litmus, an open-source chaos engineering platform used to test the resilience of cloud-native applications. The vulnerability affects all versions up to 3.19.0 and is located in the /auth/login endpoint, specifically involving improper access control related to the manipulation of the 'projectID' argument. This flaw allows an attacker to remotely exploit the system without requiring user interaction or elevated privileges, potentially bypassing intended access restrictions. The vulnerability is classified as medium severity with a CVSS 4.0 base score of 5.3, indicating moderate impact. The attack vector is network-based with low attack complexity and no privileges required, but it results in limited confidentiality, integrity, and availability impacts. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released yet. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could allow unauthorized access to project-specific resources or data within the LitmusChaos platform, undermining the security controls designed to isolate projects and users. Given LitmusChaos’s role in managing chaos experiments, unauthorized access could lead to manipulation or disruption of testing environments, potentially impacting the reliability and security validation of critical cloud infrastructure.

Potential Impact

For European organizations, especially those leveraging LitmusChaos for chaos engineering in cloud-native environments, this vulnerability poses a risk of unauthorized access to project-level resources. This could lead to exposure or manipulation of sensitive test configurations and results, undermining trust in resilience testing processes. In regulated industries such as finance, healthcare, and critical infrastructure, improper access could violate compliance requirements related to data protection and operational integrity. Additionally, attackers could leverage this vulnerability to disrupt chaos experiments, causing false positives or negatives in resilience assessments, which might delay incident response or risk mitigation efforts. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it could serve as a foothold for further attacks or lateral movement within an organization’s cloud environment. The lack of vendor response and patches increases the urgency for organizations to implement compensating controls. Given the remote exploitability and absence of required user interaction, the threat surface is broad, potentially affecting any European entity using vulnerable LitmusChaos versions in their DevOps or SRE workflows.

Mitigation Recommendations

European organizations should immediately audit their use of LitmusChaos and identify any deployments running versions up to 3.19.0. Until an official patch is released, organizations should implement strict network segmentation and access controls to limit exposure of the /auth/login endpoint to trusted internal networks only. Employing Web Application Firewalls (WAFs) with custom rules to detect and block anomalous manipulation of the 'projectID' parameter can reduce exploitation risk. Monitoring and logging access to authentication endpoints should be enhanced to detect suspicious activity promptly. Organizations should also consider temporarily disabling or restricting chaos experiments that rely on projectID parameters until a fix is available. Coordinating with cloud providers or platform teams to enforce multi-factor authentication and least privilege principles around LitmusChaos access can further mitigate risk. Finally, organizations should maintain vigilance for any emerging exploit code or patches and plan for rapid deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T05:34:13.313Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6898327fad5a09ad00114414

Added to database: 8/10/2025, 5:47:43 AM

Last enriched: 8/10/2025, 6:02:45 AM

Last updated: 8/10/2025, 1:55:57 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats