Page 2 of 34 results (0.012 seconds)

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version number or to execute parts of the upgrade process without permission. As upgrading in the user interface is deprecated, this functionality is no longer required. • https://github.com/mautic/mautic/security/advisories/GHSA-x3jx-5w6m-q2fc • CWE-287: Improper Authentication •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability. • https://github.com/mautic/mautic/security/advisories/GHSA-mgv8-w49f-822w • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle. The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems. • https://github.com/mautic/mautic/security/advisories/GHSA-jj6w-2cqg-7p94 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

Prior to the patched version, logged in users of Mautic are vulnerable to a self XSS vulnerability in the notifications within Mautic. Users could inject malicious code into the notification when saving Dashboards. • https://github.com/mautic/mautic/security/advisories/GHSA-fhcx-f7jg-jx3f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

Prior to the patched version, logged in users of Mautic are vulnerable to Relative Path Traversal/Arbitrary File Deletion. Regardless of the level of access the Mautic user had, they could delete files other than those in the media folders such as system files, libraries or other important files. This vulnerability exists in the implementation of the GrapesJS builder in Mautic. • https://github.com/mautic/mautic/security/advisories/GHSA-9fcx-cv56-w58p • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •