The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation.
This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-2721 | Duplicate Advisory: Mautic has insufficient authentication in upgrade flow |
![]() |
EUVD-2024-2855 | This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts. * Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system. |
![]() |
GHSA-qf6m-6m4g-rmrc | Mautic has insufficient authentication in upgrade flow |
Solution
Upgrade to 4.4.13 or 5.1.1 or higher.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 27 Feb 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Acquia
Acquia mautic |
|
CPEs | cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:* |
|
Vendors & Products |
Acquia
Acquia mautic |
Thu, 19 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 18 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable. | |
Title | Insufficient authentication in upgrade flow | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Mautic
Published:
Updated: 2024-09-19T14:47:14.786Z
Reserved: 2022-02-22T20:17:36.804Z
Link: CVE-2022-25770

Updated: 2024-09-19T14:47:11.083Z

Status : Analyzed
Published: 2024-09-18T22:15:03.827
Modified: 2025-02-27T19:30:33.180
Link: CVE-2022-25770

No data.

No data.