CVE-2025-51306
📋 TL;DR
This vulnerability in Gatling Enterprise allows users who have logged out to continue using their session tokens indefinitely due to improper session expiration. This affects all Gatling Enterprise users running versions below 1.25.0, potentially enabling unauthorized access to application functionality.
💻 Affected Systems
- Gatling Enterprise
📦 What is this software?
Gatling by Gatling
⚠️ Risk & Real-World Impact
Worst Case
An attacker who obtains a valid session token could maintain persistent unauthorized access to the Gatling Enterprise application, potentially accessing sensitive performance testing data, modifying configurations, or disrupting testing operations.
Likely Case
Former employees or users who have logged out could unintentionally or intentionally continue accessing the application, leading to unauthorized actions or data exposure.
If Mitigated
With proper network segmentation and access controls, the impact is limited to the Gatling Enterprise application itself, preventing lateral movement to other systems.
🎯 Exploit Status
Exploitation requires obtaining a valid session token, which could be done through various means including session hijacking, token theft, or legitimate user access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.25.0
Vendor Advisory: https://gatling.io/products
Restart Required: No
Instructions:
1. Backup current Gatling Enterprise configuration and data
2. Download Gatling Enterprise version 1.25.0 or later from official sources
3. Follow the upgrade instructions specific to your deployment method (Docker, Kubernetes, or standalone)
4. Verify the upgrade completed successfully
🔧 Temporary Workarounds
Session Timeout Reduction
allConfigure shorter session timeout values to limit the window where stolen tokens remain valid
Configure in Gatling Enterprise settings: Set session timeout to minimum acceptable value
Network Access Restriction
allRestrict network access to Gatling Enterprise to only trusted IP ranges
Configure firewall rules to limit access to Gatling Enterprise ports from authorized networks only
🧯 If You Can't Patch
- Implement network segmentation to isolate Gatling Enterprise from critical systems
- Enable detailed logging and monitoring for unusual session activity
- Implement multi-factor authentication if supported
- Regularly rotate session tokens through forced logouts
🔍 How to Verify
Check if Vulnerable:
Check the Gatling Enterprise version in the admin interface or configuration files. If version is below 1.25.0, the system is vulnerable.
Check Version:
Check Gatling Enterprise web interface admin panel or configuration files for version information
Verify Fix Applied:
After upgrading to 1.25.0 or later, test that logging out invalidates session tokens by attempting to use a logged-out session token.
📡 Detection & Monitoring
Log Indicators:
- Multiple successful requests using the same session token after logout events
- Session tokens being used for extended periods without re-authentication
- Access from unusual IP addresses using valid session tokens
Network Indicators:
- Unusual patterns of API calls to Gatling Enterprise endpoints
- Traffic to Gatling Enterprise from unexpected sources
SIEM Query:
source="gatling-enterprise-logs" AND (event_type="api_call" AND session_token=* AND user_status="logged_out")
🔗 References
- https://gatling.io/products
- https://github.com/Flo354/vulnerabilities/blob/main/gatling-enterprise/CVE-2025-51306-broken-logout.md
- https://github.com/Flo354/vulnerabilities/blob/main/gatling-enterprise/CVE-2025-51306-change-permissions-not-reflected.md
- https://github.com/Flo354/vulnerabilities/tree/main/gatling-enterprise