Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2891 | Mautic vulnerable to Improper Access Control in UI upgrade process |
Github GHSA |
GHSA-x3jx-5w6m-q2fc | Mautic vulnerable to Improper Access Control in UI upgrade process |
Solution
Update to 4.4.13 or 5.1.1 or higher.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 27 Feb 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acquia
Acquia mautic |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Acquia
Acquia mautic |
Thu, 19 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Sep 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version number or to execute parts of the upgrade process without permission. As upgrading in the user interface is deprecated, this functionality is no longer required. | |
| Title | Improper Access Control in UI upgrade process | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Mautic
Published:
Updated: 2024-09-19T15:42:44.517Z
Reserved: 2022-02-22T20:17:36.803Z
Link: CVE-2022-25768
Updated: 2024-09-19T15:42:40.881Z
Status : Analyzed
Published: 2024-09-18T21:15:12.860
Modified: 2025-02-27T19:30:33.180
Link: CVE-2022-25768
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA