First published: Mon Aug 30 2021(Updated: )
### Impact For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | <4.0.0>=3.3.0<3.3.4>=3.2.0<3.3.0>=3.1.0<3.2.0>=3.0.0<3.1.0 | |
Acquia Mautic | <3.3.4 | |
Acquia Mautic | =4.0.0-alpha1 | |
Acquia Mautic | =4.0.0-beta | |
Acquia Mautic | =4.0.0-rc | |
composer/mautic/core | >=4.0.0-alpha1<4.0.0 | 4.0.0 |
composer/mautic/core | <3.3.4 | 3.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.