- Description
- In Gatling Enterprise versions below 1.25.0, a low-privileged user that does not hold the role "admin" could perform a REST API call on read-only endpoints, allowing him to collect some information, due to missing authorization checks.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- gatling
CVSS 3.1
- Type
- Secondary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-862
- Hype score
- Not currently trending
CVE Alert: CVE-2025-51308 - https://t.co/JED5cWb6sy #OSINT #ThreatIntel #CyberSecurity #cve_2025_51308
@RedPacketSec
7 Aug 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-51308 In Gatling Enterprise versions below 1.25.0, a low-privileged user that does not hold the role "admin" could perform a REST API call on read-only endpoints, allowing … https://t.co/yUf0y5YvfC
@CVEnew
6 Aug 2025
340 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gatling:gatling:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "E108DC97-E878-4E04-8616-7C4ECB3BC29D",
"versionEndExcluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]