First published: Mon Aug 30 2021(Updated: )
### Impact For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | <4.0.0>=3.3.0<3.3.4>=3.2.0<3.3.0>=3.1.0<3.2.0>=3.0.0<3.1.0 | |
composer/mautic/core | >=4.0.0-alpha1<4.0.0 | 4.0.0 |
composer/mautic/core | <3.3.4 | 3.3.4 |
Mautic | <3.3.4 | |
Mautic | =4.0.0-alpha1 | |
Mautic | =4.0.0-beta | |
Mautic | =4.0.0-rc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27909 is classified as a Cross-Site Scripting (XSS) vulnerability affecting Mautic versions prior to 3.3.4.
To remediate CVE-2021-27909, upgrade to Mautic version 3.3.4 or later.
Mautic versions 3.3.0 to 3.3.4 and earlier are affected by CVE-2021-27909.
The impact of CVE-2021-27909 allows an attacker to execute JavaScript code by tricking a user into accessing a malicious URL.
No, if you are using Mautic version 3.3.4 or higher, CVE-2021-27909 is not a risk.