CVE-2024-47055
- EPSS 0.05%
- Veröffentlicht 28.05.2025 17:34:32
- Zuletzt bearbeitet 03.10.2025 14:11:44
SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference ...
CVE-2024-47053
- EPSS 0.13%
- Veröffentlicht 26.02.2025 13:15:40
- Zuletzt bearbeitet 16.10.2025 17:12:07
This advisory addresses an authorization vulnerability in Mautic's HTTP Basic Authentication implementation. This flaw could allow unauthorized access to sensitive report data. * Improper Authorization: An authorization flaw exists in Mautic's AP...
CVE-2024-47051
- EPSS 0.7%
- Veröffentlicht 26.02.2025 13:15:39
- Zuletzt bearbeitet 16.10.2025 17:11:30
This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulner...
CVE-2022-25773
- EPSS 0.14%
- Veröffentlicht 26.02.2025 13:15:32
- Zuletzt bearbeitet 16.10.2025 17:08:58
This advisory addresses a file placement vulnerability that could allow assets to be uploaded to unintended directories on the server. * Improper Limitation of a Pathname to a Restricted Directory: A vulnerability exists in the asset upload funct...
CVE-2024-47059
- EPSS 0.31%
- Veröffentlicht 18.09.2024 22:15:04
- Zuletzt bearbeitet 27.02.2025 19:30:33
When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak. However when an incorrect username is provided alongside with a weak password, the application responds with ...
CVE-2022-25770
- EPSS 0.3%
- Veröffentlicht 18.09.2024 22:15:03
- Zuletzt bearbeitet 27.02.2025 19:30:33
Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain wa...
CVE-2021-27917
- EPSS 0.33%
- Veröffentlicht 18.09.2024 22:15:03
- Zuletzt bearbeitet 27.09.2024 15:13:58
Prior to this patch, a stored XSS vulnerability existed in the contact tracking and page hits report.
CVE-2024-47050
- EPSS 0.64%
- Veröffentlicht 18.09.2024 21:15:13
- Zuletzt bearbeitet 27.09.2024 15:29:21
Prior to this patch being applied, Mautic's tracking was vulnerable to Cross-Site Scripting through the Page URL variable.
CVE-2024-47058
- EPSS 0.19%
- Veröffentlicht 18.09.2024 21:15:13
- Zuletzt bearbeitet 27.09.2024 15:31:30
With access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user's current session.
CVE-2022-25768
- EPSS 0.27%
- Veröffentlicht 18.09.2024 21:15:12
- Zuletzt bearbeitet 27.02.2025 19:30:33
The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version n...