Description
SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames.
User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack.
MitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence.
User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack.
MitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54603 | Mautic allows user name enumeration due to response time difference on password reset form |
Github GHSA |
GHSA-424x-cxvh-wq9p | Mautic allows user name enumeration due to response time difference on password reset form |
References
History
Thu, 29 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 May 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack. MitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence. | |
| Title | User name enumeration possible due to response time difference on password reset form | |
| Weaknesses | CWE-203 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Mautic
Published:
Updated: 2025-05-29T18:59:24.381Z
Reserved: 2024-09-17T13:41:00.585Z
Link: CVE-2024-47057
Updated: 2025-05-29T18:59:16.065Z
Status : Deferred
Published: 2025-05-28T18:15:25.063
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-47057
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:09:32Z
Weaknesses
EUVD
Github GHSA