logo

CVE-2021-27911 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=0 <3.3.4 || >=4.0.0-alpha1 <4.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00352 pctl0.5691

Details

XSS vulnerability on contacts view ### Impact Mautic versions before 3.3.4/4.0.0 are vulnerable to an inline JS XSS attack through the contact's first or last name and triggered when viewing a contact's details page then clicking on the action drop down and hovering over the Campaigns button. Contact first and last name can be populated from different sources such as UI, API, 3rd party syncing, forms, etc. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)

Metadata

Created: 2021-09-01T18:40:40Z
Modified: 2021-08-30T18:05:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-72hm-fx78-xwhc/GHSA-72hm-fx78-xwhc.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-72hm-fx78-xwhc
Finding: F425
Auto approve: 1