Cyber Posture

CVE-2025-8797

MediumPublic PoC

Published: 10 August 2025

Published
10 August 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0010 27.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-8797 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Litmuschaos Litmus. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-266

Designation of a manager and policy dissemination ensures privileges are assigned according to defined roles.

addresses: CWE-266

Regular reviews catch incorrect privilege assignments to users, roles, or processes.

addresses: CWE-266

Explicitly specifying privileges and group/role memberships for accounts reduces the risk of incorrect privilege assignments.

addresses: CWE-266

The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.

addresses: CWE-266

Ensures privileges are assigned only as necessary rather than incorrectly over-granted.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1222 File and Directory Permissions Modification Defense Impairment
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.
Why these techniques?

The vulnerability enables privilege escalation by manipulating the projectRole in browser localStorage (due to missing backend validation), facilitating exploitation of a software vulnerability for privilege escalation (T1068) and permissions modification akin to file/directory permissions weakness handling (T1222, as cited in VulDB advisory).

NVD Description

A vulnerability was found in LitmusChaos Litmus up to 3.19.0 and classified as critical. This issue affects some unknown processing of the component LocalStorage Handler. The manipulation leads to permission issues. The attack may be initiated remotely. The exploit has…

more

been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-8797 is a critical vulnerability in LitmusChaos Litmus versions up to 3.19.0, affecting an unknown processing component known as the LocalStorage Handler. The issue involves manipulation that leads to permission problems, classified under CWE-266 (Incorrect Privilege Assignment) and CWE-275 (Permission Issues). It carries a CVSS v3.1 base score of 6.3, reflecting network accessibility with low attack complexity.

A remote attacker with low privileges (PR:L) can exploit this vulnerability without user interaction, achieving low impacts on confidentiality, integrity, and availability. The manipulation targets the LocalStorage Handler, enabling unauthorized permission changes that could allow limited data exposure, modification, or disruption within the affected Litmus instance.

Advisories from VulDB detail the issue, noting that the exploit has been publicly disclosed and may be in use, with the vendor contacted early but providing no response. References include VulDB entries (ctiid.319325, id.319325, submit.625991) and a GitHub repository (MaiqueSilva/VulnDB readme07.md), but no patches or official mitigations are specified.

The exploit disclosure increases the risk of active exploitation in unpatched LitmusChaos Litmus deployments up to version 3.19.0.

Details

CWE(s)

Affected Products

litmuschaos
litmus
≤ 3.19.0

CVEs Like This One

CVE-2025-8795Same product: Litmuschaos Litmus
CVE-2026-27102Shared CWE-266
CVE-2025-69293Shared CWE-266
CVE-2026-25414Shared CWE-266
CVE-2025-31643Shared CWE-266
CVE-2025-33179Shared CWE-266
CVE-2026-27541Shared CWE-266
CVE-2025-69378Shared CWE-266
CVE-2024-13189Shared CWE-266, CWE-275
CVE-2025-24648Shared CWE-266

References