Lucene search

K
AcquiaMautic

6 matches found

CVE
CVE
added 2021/08/30 4:15 p.m.65 views

CVE-2021-27912

Mautic versions before 3.3.4/4.0.0 are vulnerable to an inline JS XSS attack when viewing Mautic assets by utilizing inline JS in the title and adding a broken image URL as a remote asset. This can only be leveraged by an authenticated user with permission to create or edit assets.

7.1CVSS5.4AI score0.00391EPSS
CVE
CVE
added 2022/06/01 4:15 p.m.64 views

CVE-2021-27914

A cross-site scripting (XSS) vulnerability in the installer component of Mautic before 4.3.0 allows admins to inject executable javascript

7.6CVSS4.8AI score0.00385EPSS
CVE
CVE
added 2024/09/18 10:15 p.m.52 views

CVE-2021-27917

Prior to this patch, a stored XSS vulnerability existed in the contact tracking and page hits report.

7.3CVSS5.9AI score0.00198EPSS
CVE
CVE
added 2024/09/18 3:15 p.m.52 views

CVE-2022-25775

Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle. The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems.

7.2CVSS6.8AI score0.00027EPSS
CVE
CVE
added 2024/09/18 9:15 p.m.51 views

CVE-2022-25768

The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version number or to execute parts of the upgrade process ...

7CVSS7AI score0.00161EPSS
CVE
CVE
added 2024/09/18 10:15 p.m.50 views

CVE-2022-25770

Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.

7.8CVSS7.5AI score0.00115EPSS