{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-8792","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-09T05:33:56.943Z","datePublished":"2025-08-10T03:32:06.333Z","dateUpdated":"2025-08-13T15:05:42.123Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-10T03:32:06.333Z"},"title":"LitmusChaos Litmus client-side enforcement of server-side security","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-602","lang":"en","description":"Client-Side Enforcement of Server-Side Security"}]}],"affected":[{"vendor":"LitmusChaos","product":"Litmus","versions":[{"version":"3.0","status":"affected"},{"version":"3.1","status":"affected"},{"version":"3.2","status":"affected"},{"version":"3.3","status":"affected"},{"version":"3.4","status":"affected"},{"version":"3.5","status":"affected"},{"version":"3.6","status":"affected"},{"version":"3.7","status":"affected"},{"version":"3.8","status":"affected"},{"version":"3.9","status":"affected"},{"version":"3.10","status":"affected"},{"version":"3.11","status":"affected"},{"version":"3.12","status":"affected"},{"version":"3.13","status":"affected"},{"version":"3.14","status":"affected"},{"version":"3.15","status":"affected"},{"version":"3.16","status":"affected"},{"version":"3.17","status":"affected"},{"version":"3.18","status":"affected"},{"version":"3.19.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in LitmusChaos Litmus up to 3.19.0. Affected is an unknown function. The manipulation leads to client-side enforcement of server-side security. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in LitmusChaos Litmus bis 3.19.0 entdeckt. Es betrifft eine unbekannte Funktion. Dank Manipulation mit unbekannten Daten kann eine client-side enforcement of server-side security-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-09T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-09T07:39:25.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"maique (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.319320","name":"VDB-319320 | LitmusChaos Litmus client-side enforcement of server-side security","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.319320","name":"VDB-319320 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.625952","name":"Submit #625952 | Open-Source Web LitmusChaos 3.19.0 Input Validation Bypass","tags":["third-party-advisory"]},{"url":"https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-13T15:05:39.192345Z","id":"CVE-2025-8792","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-13T15:05:42.123Z"}}]}}