First published: Thu Jan 14 2021(Updated: )
### Impact This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic. This vulnerability was reported by Naveen Sunkavally at Horizon3.ai. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | >=3.2.0<3.2.4>=3.1.0<3.2.0>=3.0.0<3.1.0>=2.0.0<2.16.5 | |
Acquia Mautic | <2.16.5 | |
Acquia Mautic | >=3.0.0<3.2.4 | |
composer/mautic/core | >=3.0.0<3.2.4 | 3.2.4 |
composer/mautic/core | <2.16.5 | 2.16.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35125 is a highly critical cross-site scripting (XSS) vulnerability in the forms component of Mautic before version 3.2.4.
CVE-2020-35125 allows remote attackers to inject executable JavaScript via the mautic parameter, leveraging referrers.
Mautic versions 2.0.0 to 2.16.5, 3.0.0 to 3.2.0, and versions up to 3.2.4 are affected by CVE-2020-35125.
CVE-2020-35125 has a severity rating of 9.6 (critical).
To fix CVE-2020-35125, update your Mautic installation to version 3.2.4 or later.