Users with low privileges can perform certain AJAX actions. In this vulnerability instance, improper access to ajax?action=plugin:focus:checkIframeAvailability leads to a Server-Side Request Forgery by analyzing the error messages returned from the back-end. Allowing an attacker to perform a port scan in the back-end. At the time of publication of the CVE no patch is available.
Max CVSS
5.0
EPSS Score
0.04%
Published
2024-04-10
Updated
2024-04-10
Users with low privileges (all permissions deselected in the administrator permissions settings) can view certain pages that expose sensitive information such as company names, users' names and surnames, stage names, and monitoring campaigns and their descriptions. In addition, unprivileged users can see and edit the descriptions of tags. At the time of publication of the CVE no patch is available.
Max CVSS
5.4
EPSS Score
0.04%
Published
2024-04-10
Updated
2024-04-10
Mautic uses predictable page indices for unpublished landing pages, their content can be accessed by unauthenticated users under public preview URLs which could expose sensitive data. At the time of publication of the CVE no patch is available
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-04-10
Updated
2024-04-10
Mautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target user’s behalf, including changing the user’s password or email address or changing the attacker’s user role from a low-privileged user to an administrator account.
Max CVSS
9.0
EPSS Score
0.10%
Published
2021-01-19
Updated
2021-01-27
An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled.
Max CVSS
7.5
EPSS Score
0.15%
Published
2018-04-17
Updated
2018-05-23
Mautic before 2.13.0 allows CSV injection.
Max CVSS
9.8
EPSS Score
0.28%
Published
2018-04-18
Updated
2020-08-24
Mautic before v2.13.0 has stored XSS via a theme config file.
Max CVSS
6.1
EPSS Score
0.08%
Published
2018-04-18
Updated
2018-05-21
Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code.
Max CVSS
6.1
EPSS Score
0.09%
Published
2018-02-09
Updated
2018-02-26
Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to.
Max CVSS
6.5
EPSS Score
0.06%
Published
2018-01-03
Updated
2021-01-25
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address
Max CVSS
8.1
EPSS Score
0.16%
Published
2018-01-03
Updated
2021-01-25
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form.
Max CVSS
6.1
EPSS Score
0.08%
Published
2018-01-03
Updated
2021-01-25
Mautic 2.6.1 and earlier fails to set flags on session cookies
Max CVSS
7.5
EPSS Score
0.09%
Published
2017-07-17
Updated
2019-10-03
12 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!