Mautic allows you to update the application via an upgrade script.

The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation.

This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2721 Duplicate Advisory: Mautic has insufficient authentication in upgrade flow
EUVD EUVD EUVD-2024-2855 This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts. * Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.
Github GHSA Github GHSA GHSA-qf6m-6m4g-rmrc Mautic has insufficient authentication in upgrade flow
Fixes

Solution

Upgrade to 4.4.13 or 5.1.1 or higher.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00098}

epss

{'score': 0.00115}


Thu, 27 Feb 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Acquia
Acquia mautic
CPEs cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*
Vendors & Products Acquia
Acquia mautic

Thu, 19 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
Description Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.
Title Insufficient authentication in upgrade flow
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mautic

Published:

Updated: 2024-09-19T14:47:14.786Z

Reserved: 2022-02-22T20:17:36.804Z

Link: CVE-2022-25770

cve-icon Vulnrichment

Updated: 2024-09-19T14:47:11.083Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-18T22:15:03.827

Modified: 2025-02-27T19:30:33.180

Link: CVE-2022-25770

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.