31 results (0.002 seconds)

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — SummaryThis advisory addresses an Open Redirection vulnerability in Mautic's user unlocking endpoint. This vulnerability could be exploited by an attacker to redirect legitimate users to malicious websites, potentially leading to phishing attacks or the delivery of exploit kits. Open Redirection via returnUrl Parameter: An Open Redirection vulnerability exists in the /s/action/unlock/user.user/0 endpoint. The returnUrl parameter, intended for post-action redirection, is not properly validated. This allows a... • https://github.com/mautic/mautic/security/advisories/GHSA-6vx9-9r2g-8373 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

28 May 2025 — SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference (IDOR) / Missing Authorization: A missing authorization vulnerability exists in the cloneAction of the segment management. This allows an authenticated user to bypass intended permission restrictions and clone segments even if they lack the necessary permissions ... • https://github.com/mautic/mautic/security/advisories/GHSA-vph5-ghq3-q782 • CWE-862: Missing Authorization •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a ti... • https://github.com/mautic/mautic/security/advisories/GHSA-424x-cxvh-wq9p • CWE-203: Observable Discrepancy •

CVSS: 5.1EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations. Sensitive Information Disclosure via .env File Exposure: The .env file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due ... • https://github.com/mautic/mautic/security/advisories/GHSA-h2wg-v8wg-jhxh • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

28 May 2025 — SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search engines. This could lead to the unintended disclosure of draft content or sensitive information. Unauthorized Access to Unpublished Page Previews: The page preview functionality for unpublished content, accessible via predictable URLs (e.g., /page/preview/1, /page/preview/2), lacked proper authorization checks. This allowed any unauthe... • https://github.com/mautic/mautic/security/advisories/GHSA-cqx4-9vqf-q3m8 • CWE-1284: Improper Validation of Specified Quantity in Input •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

26 Feb 2025 — This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts. * Path Traversal File Deletion: A Path Traversal vulnerabil... • https://github.com/mallo-m/CVE-2024-47051 • CWE-23: Relative Path Traversal CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

26 Feb 2025 — This advisory addresses an authorization vulnerability in Mautic's HTTP Basic Authentication implementation. This flaw could allow unauthorized access to sensitive report data. * Improper Authorization: An authorization flaw exists in Mautic's API Authorization implementation. Any authenticated user, regardless of assigned roles or permissions, can access all reports and their associated data via the API. This bypasses the intended access controls governed by the "Reporting Permissions > View Own" and "Repo... • https://github.com/mautic/mautic/security/advisories/GHSA-8xv7-g2q3-fqgc • CWE-285: Improper Authorization •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable. • https://github.com/mautic/mautic/security/advisories/GHSA-qf6m-6m4g-rmrc • CWE-306: Missing Authentication for Critical Function •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2024 — When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak. However when an incorrect username is provided alongside with a weak password, the application responds with ’Invalid credentials’ notification. This difference could be used to perform username enumeration. • https://github.com/mautic/mautic/security/advisories/GHSA-8vff-35qm-qjvv • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — Prior to this patch, a stored XSS vulnerability existed in the contact tracking and page hits report. • https://github.com/mautic/mautic/security/advisories/GHSA-xpc5-rr39-v8v2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •