A vulnerability, which was classified as problematic, has been found in LitmusChaos Litmus up to 3.19.0. Affected by this issue is some unknown functionality of the component LocalStorage Handler. The manipulation of the argument projectID leads to authorization bypass. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-24075 A vulnerability, which was classified as problematic, has been found in LitmusChaos Litmus up to 3.19.0. Affected by this issue is some unknown functionality of the component LocalStorage Handler. The manipulation of the argument projectID leads to authorization bypass. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 03 Sep 2025 04:00:00 +0900

Type Values Removed Values Added
First Time appeared Litmuschaos
Litmuschaos litmus
CPEs cpe:2.3:a:litmuschaos:litmus:*:*:*:*:*:*:*:*
Vendors & Products Litmuschaos
Litmuschaos litmus

Thu, 14 Aug 2025 05:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 Aug 2025 21:15:00 +0900

Type Values Removed Values Added
First Time appeared Litmus Project
Litmus Project litmus
Vendors & Products Litmus Project
Litmus Project litmus

Sun, 10 Aug 2025 14:00:00 +0900

Type Values Removed Values Added
Description A vulnerability, which was classified as problematic, has been found in LitmusChaos Litmus up to 3.19.0. Affected by this issue is some unknown functionality of the component LocalStorage Handler. The manipulation of the argument projectID leads to authorization bypass. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title LitmusChaos Litmus LocalStorage authorization
Weaknesses CWE-285
CWE-639
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-08-13T19:49:12.667Z

Reserved: 2025-08-09T05:34:10.764Z

Link: CVE-2025-8794

cve-icon Vulnrichment

Updated: 2025-08-13T19:48:59.334Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-10T05:15:24.877

Modified: 2025-09-02T18:47:07.340

Link: CVE-2025-8794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-12T20:47:17Z

Weaknesses