A vulnerability, which was classified as critical, was found in LitmusChaos Litmus up to 3.19.0. This affects an unknown part of the file /auth/login. The manipulation of the argument projectID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Litmus Project
Litmus Project litmus |
|
Vendors & Products |
Litmus Project
Litmus Project litmus |
Sun, 10 Aug 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, was found in LitmusChaos Litmus up to 3.19.0. This affects an unknown part of the file /auth/login. The manipulation of the argument projectID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | LitmusChaos Litmus login access control | |
Weaknesses | CWE-266 CWE-284 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-10T05:32:06.512Z
Updated: 2025-08-10T05:32:06.512Z
Reserved: 2025-08-09T05:34:13.313Z
Link: CVE-2025-8795

No data.

Status : Awaiting Analysis
Published: 2025-08-10T06:15:25.770
Modified: 2025-08-11T18:32:48.867
Link: CVE-2025-8795

No data.