CVE-2025-8796: Missing Authorization in LitmusChaos Litmus
A vulnerability has been found in LitmusChaos Litmus up to 3.19.0 and classified as problematic. This vulnerability affects unknown code of the file /auth/delete_project/ of the component Delete Request Handler. The manipulation of the argument projectID leads to missing authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8796 is a medium-severity vulnerability affecting LitmusChaos Litmus versions up to 3.19.0. The vulnerability resides in the Delete Request Handler component, specifically in the /auth/delete_project/ endpoint. The issue is a missing authorization check when processing the projectID argument, allowing an attacker to manipulate this parameter to bypass authorization controls. This flaw enables remote attackers to potentially delete projects without proper permissions. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity, though it requires some level of privileges (PR:L) according to the CVSS vector. The impact on confidentiality is none, but integrity and availability are partially affected due to the ability to delete projects. The vendor was notified but has not responded, and no patches have been released yet. Although no known exploits are currently in the wild, public disclosure increases the risk of exploitation. Given LitmusChaos is a tool used for chaos engineering in Kubernetes environments, unauthorized deletion of projects could disrupt testing workflows, impact development pipelines, and potentially cause downtime or misconfiguration in critical cloud-native infrastructure.
Potential Impact
For European organizations using LitmusChaos Litmus, this vulnerability could lead to unauthorized deletion of chaos engineering projects, undermining the reliability and resilience testing of their Kubernetes clusters. This may result in reduced confidence in system stability, delayed incident response, and potential service disruptions. Organizations relying on chaos engineering to validate fault tolerance and recovery mechanisms could face increased operational risk. Additionally, if project deletion affects audit trails or configuration states, it could complicate compliance with European data protection and operational standards such as GDPR and NIS Directive. The remote exploitability and lack of required user interaction make this a significant threat in environments where LitmusChaos is integrated into CI/CD pipelines or automated testing frameworks.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include restricting network access to the /auth/delete_project/ endpoint using firewall rules or API gateways to limit exposure to trusted internal IPs only. Implement strict role-based access controls (RBAC) at the Kubernetes cluster and application levels to ensure only authorized personnel can invoke project deletion APIs. Monitor and log all delete project requests for unusual activity and establish alerting mechanisms for unauthorized attempts. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious parameter manipulation. Organizations should also evaluate the feasibility of temporarily disabling the delete project functionality if it is not critical. Finally, maintain close communication with the LitmusChaos vendor and community for updates or patches and plan for rapid deployment once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-8796: Missing Authorization in LitmusChaos Litmus
Description
A vulnerability has been found in LitmusChaos Litmus up to 3.19.0 and classified as problematic. This vulnerability affects unknown code of the file /auth/delete_project/ of the component Delete Request Handler. The manipulation of the argument projectID leads to missing authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8796 is a medium-severity vulnerability affecting LitmusChaos Litmus versions up to 3.19.0. The vulnerability resides in the Delete Request Handler component, specifically in the /auth/delete_project/ endpoint. The issue is a missing authorization check when processing the projectID argument, allowing an attacker to manipulate this parameter to bypass authorization controls. This flaw enables remote attackers to potentially delete projects without proper permissions. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity, though it requires some level of privileges (PR:L) according to the CVSS vector. The impact on confidentiality is none, but integrity and availability are partially affected due to the ability to delete projects. The vendor was notified but has not responded, and no patches have been released yet. Although no known exploits are currently in the wild, public disclosure increases the risk of exploitation. Given LitmusChaos is a tool used for chaos engineering in Kubernetes environments, unauthorized deletion of projects could disrupt testing workflows, impact development pipelines, and potentially cause downtime or misconfiguration in critical cloud-native infrastructure.
Potential Impact
For European organizations using LitmusChaos Litmus, this vulnerability could lead to unauthorized deletion of chaos engineering projects, undermining the reliability and resilience testing of their Kubernetes clusters. This may result in reduced confidence in system stability, delayed incident response, and potential service disruptions. Organizations relying on chaos engineering to validate fault tolerance and recovery mechanisms could face increased operational risk. Additionally, if project deletion affects audit trails or configuration states, it could complicate compliance with European data protection and operational standards such as GDPR and NIS Directive. The remote exploitability and lack of required user interaction make this a significant threat in environments where LitmusChaos is integrated into CI/CD pipelines or automated testing frameworks.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include restricting network access to the /auth/delete_project/ endpoint using firewall rules or API gateways to limit exposure to trusted internal IPs only. Implement strict role-based access controls (RBAC) at the Kubernetes cluster and application levels to ensure only authorized personnel can invoke project deletion APIs. Monitor and log all delete project requests for unusual activity and establish alerting mechanisms for unauthorized attempts. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious parameter manipulation. Organizations should also evaluate the feasibility of temporarily disabling the delete project functionality if it is not critical. Finally, maintain close communication with the LitmusChaos vendor and community for updates or patches and plan for rapid deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-09T05:34:15.676Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68983989ad5a09ad0011631c
Added to database: 8/10/2025, 6:17:45 AM
Last enriched: 8/10/2025, 6:32:44 AM
Last updated: 8/10/2025, 2:14:07 PM
Views: 5
Related Threats
CVE-2025-8818: OS Command Injection in Linksys RE6250
MediumCVE-2025-8816: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8815: Path Traversal in 猫宁i Morning
MediumCVE-2025-8814: Cross-Site Request Forgery in atjiu pybbs
MediumCVE-2025-8813: Open Redirect in atjiu pybbs
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.