In Gatling Enterprise versions below 1.25.0, a low-privileged user that does not hold the role "admin" could perform a REST API call on read-only endpoints, allowing him to collect some information, due to missing authorization checks.
References
Configurations
History
09 Oct 2025, 17:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gatling:gatling:*:*:*:*:enterprise:*:*:* | |
Summary |
|
|
References | () https://gatling.io/products - Product | |
References | () https://github.com/Flo354/vulnerabilities/blob/main/gatling-enterprise/CVE-2025-51308-broken-access-control.md - Exploit | |
References | () https://github.com/Flo354/vulnerabilities/tree/main/gatling-enterprise - Exploit | |
First Time |
Gatling
Gatling gatling |
06 Aug 2025, 20:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-862 |
06 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-06 15:15
Updated : 2025-10-09 17:35
NVD link : CVE-2025-51308
Mitre link : CVE-2025-51308
CVE.ORG link : CVE-2025-51308
JSON object : View
Products Affected
gatling
- gatling
CWE
CWE-862
Missing Authorization