First published: Wed Apr 18 2018(Updated: )
### Impact Mautic before v2.13.0 has stored XSS via a theme config file. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | <2.13.0 | 2.13.0 |
Mautic | <2.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8071 refers to a vulnerability in Mautic before v2.13.0 that allows for stored cross-site scripting (XSS) attacks via a theme config file.
The impact of CVE-2018-8071 is that it allows for stored XSS attacks, which can lead to unauthorized access, data theft, and potentially further exploitation of the affected system.
To patch against CVE-2018-8071, update Mautic to version 2.13.0 or later.
No, there are no known workarounds for CVE-2018-8071.
You can find more information about CVE-2018-8071 in the Mautic security advisories and NIST vulnerability database, as well as the associated GitHub commit.