logo

CVE-2022-25777 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=1.0.0-beta4 <4.4.12 || >=5.0.0-alpha <5.0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00104 pctl0.29099

Details

Mautic: MST-48 Server-Side Request Forgery in Asset section ### Impact Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability. ### Patches Update to 4.4.12 or 5.0.4 ### Workarounds None ### References - https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/ If you have any questions or comments about this advisory: Email us at [security@mautic.org](mailto:security@mautic.org)

Metadata

Created: 2024-04-12T21:25:18Z
Modified: 2024-09-18T19:01:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-mgv8-w49f-822w/GHSA-mgv8-w49f-822w.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-mgv8-w49f-822w
Finding: F100
Auto approve: 1