mautic/core Security Advisories for 5.1.0 (7)
-
[HIGH] Mautic has insufficient authentication in upgrade flow
PKSA-gfhc-2ry6-vg76 CVE-2022-25770 GHSA-5hc5-fxr9-5frc
Affected version: >=5.0.0,<5.1.1|>=1.0.0-beta3,<4.4.13
Reported by:
GitHub -
[LOW] Mautic allows users enumeration due to weak password login
PKSA-vtdm-dnf3-m5wp CVE-2024-47059 GHSA-8vff-35qm-qjvv
Affected version: >=5.1.0,<5.1.1
Reported by:
GitHub -
[HIGH] Mautic has insufficient authentication in upgrade flow
PKSA-zrpx-tjt4-ctvz CVE-2024-47051 GHSA-qf6m-6m4g-rmrc
Affected version: >=5.0.0-alpha,<5.1.1|>=1.0.0-beta3,<4.4.13
Reported by:
GitHub -
[HIGH] Mautic has an XSS in contact tracking and page hits report
PKSA-39c1-mjv2-cwmh CVE-2021-27917 GHSA-xpc5-rr39-v8v2
Affected version: >=5.0.0-alpha,<5.1.1|>=1.0.0-beta4,<4.4.13
Reported by:
GitHub -
[MEDIUM] Mautic vulnerable to XSS in contact/company tracking (no authentication)
PKSA-x4f7-yvw2-qxkj CVE-2024-47050 GHSA-73gr-32wg-qhh7
Affected version: >=5.0.0-alpha,<5.1.1|>=2.6.0,<4.4.13
Reported by:
GitHub -
[LOW] Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)
PKSA-zw3g-4t7k-356g CVE-2024-47058 GHSA-xv68-rrmw-9xwf
Affected version: >=1.0.0-beta,<4.4.13|>=5.0.0-alpha,<5.1.1
Reported by:
GitHub -
[HIGH] Mautic vulnerable to Improper Access Control in UI upgrade process
PKSA-1qjd-2pbn-b37d CVE-2022-25768 GHSA-x3jx-5w6m-q2fc
Affected version: >=5.0.0-alpha,<5.1.1|>=1.1.3,<4.4.13
Reported by:
GitHub