Filtered by vendor Mautic
Subscriptions
Filtered by product Mautic
Subscriptions
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-35129 | 1 Mautic | 1 Mautic | 2024-11-21 | 9.0 Critical |
Mautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target user’s behalf, including changing the user’s password or email address or changing the attacker’s user role from a low-privileged user to an administrator account. | ||||
CVE-2018-8092 | 1 Mautic | 1 Mautic | 2024-11-21 | N/A |
Mautic before 2.13.0 allows CSV injection. | ||||
CVE-2018-8071 | 1 Mautic | 1 Mautic | 2024-11-21 | N/A |
Mautic before v2.13.0 has stored XSS via a theme config file. | ||||
CVE-2018-10189 | 1 Mautic | 1 Mautic | 2024-11-21 | N/A |
An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. | ||||
CVE-2017-1000506 | 1 Mautic | 1 Mautic | 2024-11-21 | N/A |
Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code. | ||||
CVE-2017-1000490 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-11-21 | N/A |
Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. | ||||
CVE-2017-1000489 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-11-21 | N/A |
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address | ||||
CVE-2017-1000488 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-11-21 | N/A |
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form. | ||||
CVE-2017-1000046 | 1 Mautic | 1 Mautic | 2024-11-21 | N/A |
Mautic 2.6.1 and earlier fails to set flags on session cookies | ||||
CVE-2021-27915 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-09-29 | 7.6 High |
Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions. This could lead to the user having elevated access to the system. | ||||
CVE-2024-47059 | 1 Mautic | 1 Mautic | 2024-09-25 | 4.3 Medium |
When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak. However when an incorrect username is provided alongside with a weak password, the application responds with ’Invalid credentials’ notification. This difference could be used to perform username enumeration. | ||||
CVE-2022-25775 | 2 Acquia, Mautic | 2 Mautic, Mautic | 2024-09-24 | 6.6 Medium |
Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle. The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems. | ||||
CVE-2022-25769 | 1 Mautic | 1 Mautic | 2024-09-20 | 7.2 High |
ImpactThe default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. |
Page 1 of 1.