Filtered by vendor Mautic
Subscriptions
Filtered by product Mautic
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-25775 | 1 Mautic | 1 Mautic | 2024-09-18 | 6.6 Medium |
Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle. The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems. | ||||
CVE-2022-25769 | 1 Mautic | 1 Mautic | 2024-09-18 | 7.2 High |
ImpactThe default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. | ||||
CVE-2021-27915 | 1 Mautic | 1 Mautic | 2024-09-17 | 7.6 High |
Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions. This could lead to the user having elevated access to the system. | ||||
CVE-2017-1000489 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-09-17 | N/A |
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address | ||||
CVE-2018-10189 | 1 Mautic | 1 Mautic | 2024-09-17 | N/A |
An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. | ||||
CVE-2017-1000488 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-09-16 | N/A |
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form. | ||||
CVE-2017-1000490 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-09-16 | N/A |
Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. | ||||
CVE-2017-1000506 | 1 Mautic | 1 Mautic | 2024-08-05 | N/A |
Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code. | ||||
CVE-2017-1000046 | 1 Mautic | 1 Mautic | 2024-08-05 | N/A |
Mautic 2.6.1 and earlier fails to set flags on session cookies | ||||
CVE-2018-8092 | 1 Mautic | 1 Mautic | 2024-08-05 | N/A |
Mautic before 2.13.0 allows CSV injection. | ||||
CVE-2018-8071 | 1 Mautic | 1 Mautic | 2024-08-05 | N/A |
Mautic before v2.13.0 has stored XSS via a theme config file. | ||||
CVE-2020-35129 | 1 Mautic | 1 Mautic | 2024-08-04 | 9.0 Critical |
Mautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target user’s behalf, including changing the user’s password or email address or changing the attacker’s user role from a low-privileged user to an administrator account. |
Page 1 of 1.