logo

CVE-2024-47053 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=1.0.1 <5.2.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00105 pctl0.29175

Details

Mautic allows Improper Authorization in Reporting API ### Summary This advisory addresses an authorization vulnerability in Mautic's HTTP Basic Authentication implementation. This flaw could allow unauthorized access to sensitive report data. * **Improper Authorization:** An authorization flaw exists in Mautic's API Authorization implementation. Any authenticated user, regardless of assigned roles or permissions, can access all reports and their associated data via the API. This bypasses the intended access controls governed by the "Reporting Permissions > View Own" and "Reporting Permissions > View Others" permissions, which should restrict access to non-System Reports. ### Mitigation Please update to Mautic 5.2.3 or later ### Workarounds Disable the API in Mautic. See [documentation](https://docs.mautic.org/en/5.2/configuration/settings.html#api-settings). ### References https://cwe.mitre.org/data/definitions/285.html https://docs.mautic.org/en/5.2/configuration/settings.html#api-settings If you have any questions or comments about this advisory: Email us at [security@mautic.org](mailto:security@mautic.org)

Metadata

Created: 2025-02-26T20:08:30Z
Modified: 2025-02-26T20:08:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-8xv7-g2q3-fqgc/GHSA-8xv7-g2q3-fqgc.json
CWE IDs: ["CWE-285", "CWE-863"]
Alternative ID: GHSA-8xv7-g2q3-fqgc
Finding: F039
Auto approve: 1