First published: Mon Aug 30 2021(Updated: )
### Impact Mautic versions before 3.3.4/4.0.0 are vulnerable to an inline JS XSS attack through the contact's first or last name and triggered when viewing a contact's details page then clicking on the action drop down and hovering over the Campaigns button. Contact first and last name can be populated from different sources such as UI, API, 3rd party syncing, forms, etc. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | <4.0.0>=3.3.0<3.3.4>=3.2.0<3.3.0>=3.1.0<3.2.0>=3.0.0<3.1.0 | |
Acquia Mautic | <3.3.4 | |
Acquia Mautic | =4.0.0-alpha1 | |
Acquia Mautic | =4.0.0-beta | |
Acquia Mautic | =4.0.0-rc | |
composer/mautic/core | >=4.0.0-alpha1<4.0.0 | 4.0.0 |
composer/mautic/core | <3.3.4 | 3.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27911 is an XSS vulnerability in Mautic versions before 3.3.4/4.0.0 that allows an inline JS XSS attack through the contact's first or last name.
CVE-2021-27911 has a severity level of 6.1 (high).
To fix CVE-2021-27911, update Mautic to version 3.3.4 or 4.0.0.
The CWE of CVE-2021-27911 is CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')).
More information about CVE-2021-27911 can be found at the following reference: [link](https://github.com/mautic/mautic/security/advisories/GHSA-72hm-fx78-xwhc).