logo

CVE-2022-25770 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=1.0.0-beta3 <4.4.13 || >=5.0.0-alpha <5.1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N

EPSS: 0.00115 pctl0.30873

Details

Mautic has insufficient authentication in upgrade flow ### Impact Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable ### Patches Please upgrade to 4.4.1 or 5.1.1 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)

Metadata

Created: 2024-09-18T22:06:13Z
Modified: 2025-02-21T22:13:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-qf6m-6m4g-rmrc/GHSA-qf6m-6m4g-rmrc.json
CWE IDs: ["CWE-306"]
Alternative ID: GHSA-qf6m-6m4g-rmrc
Finding: F006
Auto approve: 1