SummaryA user with administrator rights can change the configuration of the mautic application and extract secrets that are not normally available.

ImpactAn administrator who usually does not have access to certain parameters, such as database credentials, can disclose them.
History

Wed, 03 Sep 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Mautic
Mautic mautic
Vendors & Products Mautic
Mautic mautic

Wed, 03 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Description SummaryA user with administrator rights can change the configuration of the mautic application and extract secrets that are not normally available. ImpactAn administrator who usually does not have access to certain parameters, such as database credentials, can disclose them.
Title Secret data extraction via elfinder
Weaknesses CWE-283
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mautic

Published:

Updated: 2025-09-03T14:09:46.199Z

Reserved: 2025-09-02T08:22:34.513Z

Link: CVE-2025-9822

cve-icon Vulnrichment

Updated: 2025-09-03T14:09:33.496Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-03T14:15:46.247

Modified: 2025-09-04T15:36:56.447

Link: CVE-2025-9822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-03T19:30:13Z