Acquia

Mautic

32 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 28.05.2025 17:34:32
  • Last modified 03.10.2025 14:11:44

SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference ...

  • EPSS 0.16%
  • Published 18.09.2024 22:15:04
  • Last modified 27.02.2025 19:30:33

When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak. However when an incorrect username is provided alongside with a weak password, the application responds with ...

  • EPSS 0.12%
  • Published 18.09.2024 22:15:03
  • Last modified 27.02.2025 19:30:33

Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain wa...

  • EPSS 0.2%
  • Published 18.09.2024 22:15:03
  • Last modified 27.09.2024 15:13:58

Prior to this patch, a stored XSS vulnerability existed in the contact tracking and page hits report.

  • EPSS 0.14%
  • Published 18.09.2024 21:15:13
  • Last modified 27.09.2024 15:31:30

With access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user's current session.

  • EPSS 0.2%
  • Published 18.09.2024 21:15:13
  • Last modified 27.09.2024 15:29:21

Prior to this patch being applied, Mautic's tracking was vulnerable to Cross-Site Scripting through the Page URL variable.

  • EPSS 0.16%
  • Published 18.09.2024 21:15:12
  • Last modified 27.02.2025 19:30:33

The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version n...

  • EPSS 0.1%
  • Published 18.09.2024 16:15:04
  • Last modified 27.02.2025 19:30:33

Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability.

  • EPSS 0.04%
  • Published 18.09.2024 15:15:13
  • Last modified 24.09.2024 15:19:46

Prior to the patched version, logged in users of Mautic are able to access areas of the application that they should be prevented from accessing. Users could potentially access sensitive data such as names and surnames, company names and stage names...

  • EPSS 0.03%
  • Published 18.09.2024 15:15:13
  • Last modified 23.09.2024 23:22:15

Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle. The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can ...