In Gatling Enterprise versions below 1.25.0, a low-privileged user that does not hold the role "admin" could perform a REST API call on read-only endpoints, allowing him to collect some information, due to missing authorization checks.
                
            References
                    Configurations
                    History
                    09 Oct 2025, 17:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gatling.io/products - Product | |
| References | () https://github.com/Flo354/vulnerabilities/blob/main/gatling-enterprise/CVE-2025-51308-broken-access-control.md - Exploit | |
| References | () https://github.com/Flo354/vulnerabilities/tree/main/gatling-enterprise - Exploit | |
| First Time | 
        
        Gatling gatling
         Gatling  | 
|
| Summary | 
        
        
  | 
|
| CPE | cpe:2.3:a:gatling:gatling:*:*:*:*:enterprise:*:*:* | 
06 Aug 2025, 20:23
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.3  | 
| CWE | CWE-862 | 
06 Aug 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-06 15:15
Updated : 2025-10-09 17:35
NVD link : CVE-2025-51308
Mitre link : CVE-2025-51308
CVE.ORG link : CVE-2025-51308
JSON object : View
Products Affected
                gatling
- gatling
 
CWE
                
                    
                        
                        CWE-862
                        
            Missing Authorization
