First published: Fri Apr 12 2024(Updated: )
### Impact Prior to the patched version, logged in users of Mautic are vulnerable to Relative Path Traversal/Arbitrary File Deletion. Regardless of the level of access the Mautic user had, they could delete files other than those in the media folders such as system files, libraries or other important files. This vulnerability exists in the implementation of the GrapesJS builder in Mautic. ### Patches Update to 4.4.12 or 5.0.4. ### Workarounds No ### References - https://cwe.mitre.org/data/definitions/23.html - https://cwe.mitre.org/data/definitions/22.html - https://attack.mitre.org/techniques/T1630/002/ ### For more information If you have any questions or comments about this advisory: Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | >=5.0.0-alpha<5.0.4 | 5.0.4 |
composer/mautic/core | >=3.3.0<4.4.12 | 4.4.12 |
Acquia Mautic | >=3.3.0<4.4.12 | |
Acquia Mautic | >=5.0.0<5.0.4 | |
>=3.3.0<4.4.12 | ||
>=5.0.0<5.0.4 |
Upgrade to 4.4.12 or 5.0.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.