CVE-2022-25775 – mautic/core
Package
Manager: composer
Name: mautic/core
Vulnerable Version: >=2.14.1 <4.4.12 || >=5.0.0-alpha <5.0.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00027 pctl0.05955
Details
Mautic SQL Injection in dynamic Reports ### Impact Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle. The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems. ### Patches Update to 4.4.12 or 5.0.4 ### Workarounds No ### References - https://owasp.org/www-community/attacks/SQL_Injection - https://owasp.org/www-community/attacks/Blind_SQL_Injection
Metadata
Created: 2024-04-12T17:25:15Z
Modified: 2024-09-18T16:56:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-jj6w-2cqg-7p94/GHSA-jj6w-2cqg-7p94.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-jj6w-2cqg-7p94
Finding: F297
Auto approve: 1