logo

CVE-2022-25776 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=1.0.2 <4.4.12 || >=5.0.0-alpha <5.0.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00038 pctl0.10317

Details

Mautic Sensitive Data Exposure due to inadequate user permission settings ### Impact Prior to the patched version, logged in users of Mautic are able to access areas of the application that they should be prevented from accessing. Users could potentially access sensitive data such as names and surnames, company names and stage names. ### Patches Update to 4.4.12 and 5.0.4 ### Workarounds No ### References https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure

Metadata

Created: 2024-04-12T17:28:52Z
Modified: 2024-09-18T16:57:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-qjx3-2g35-6hv8/GHSA-qjx3-2g35-6hv8.json
CWE IDs: ["CWE-276", "CWE-280"]
Alternative ID: GHSA-qjx3-2g35-6hv8
Finding: F159
Auto approve: 1