CVE-2022-25776 – mautic/core
Package
Manager: composer
Name: mautic/core
Vulnerable Version: >=1.0.2 <4.4.12 || >=5.0.0-alpha <5.0.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00038 pctl0.10317
Details
Mautic Sensitive Data Exposure due to inadequate user permission settings ### Impact Prior to the patched version, logged in users of Mautic are able to access areas of the application that they should be prevented from accessing. Users could potentially access sensitive data such as names and surnames, company names and stage names. ### Patches Update to 4.4.12 and 5.0.4 ### Workarounds No ### References https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure
Metadata
Created: 2024-04-12T17:28:52Z
Modified: 2024-09-18T16:57:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-qjx3-2g35-6hv8/GHSA-qjx3-2g35-6hv8.json
CWE IDs: ["CWE-276", "CWE-280"]
Alternative ID: GHSA-qjx3-2g35-6hv8
Finding: F159
Auto approve: 1