Resource Identifier Manipulation in LitmusChaos by ChaosNative
CVE-2025-8793
5.3MEDIUM
Key Information:
- Vendor
Litmuschaos
- Status
- Vendor
- CVE Published:
- 10 August 2025
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2025-8793?
A security vulnerability in versions of LitmusChaos prior to 3.19.0 allows for improper control of resource identifiers through manipulation of the projectID argument. This issue poses a risk as it can be exploited remotely, potentially leading to unauthorized access or control over the affected resources. The concern has been publicly disclosed, yet the vendor has not responded to the report.
Affected Version(s)
Litmus 3.0
Litmus 3.1
Litmus 3.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
maique (VulDB User)