Lucene search

K
githubGitHub Advisory DatabaseGHSA-XV68-RRMW-9XWF
HistorySep 18, 2024 - 10:05 p.m.

Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)

2024-09-1822:05:00
CWE-79
GitHub Advisory Database
github.com
1
mautic
cross-site scripting
html
vulnerability
security advisory
upgrade
patch

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0

Percentile

9.6%

Impact

With access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user’s current session.

Patches

Upgrade to 4.4.13 or 5.1.1 or later.

Workarounds

None

References

If you have any questions or comments about this advisory:

Email us at [email protected]

Affected configurations

Vulners
Node
mauticcore-libRange1.0.0-beta4.4.13
OR
mauticcore-libRange5.0.0-alpha5.1.1
OR
mauticcoreRange1.0.0-beta4.4.13
OR
mauticcoreRange5.0.0-alpha5.1.1
VendorProductVersionCPE
mauticcore-lib*cpe:2.3:a:mautic:core-lib:*:*:*:*:*:*:*:*
mauticcore*cpe:2.3:a:mautic:core:*:*:*:*:*:*:*:*

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0

Percentile

9.6%

Related for GHSA-XV68-RRMW-9XWF