First published: Wed Sep 18 2024(Updated: )
ImpactThe default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path.
Credit: security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mautic | <3.3.5 | |
Mautic | >=4.0.0<4.2.0 |
Upgrade to 3.3.5 or 4.2.0. If you're using Mautic in a sub-folder with Apache (e.g. example.com/mautic), please review the guidance in this GitHub issue https://github.com/mautic/mautic/issues/10913#issuecomment-1055681986 before updating, as you will probably need to make some changes to the .htaccess file after you update.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25769 is considered a medium severity vulnerability due to its access restrictions not being correctly enforced.
To fix CVE-2022-25769, update Mautic to version 4.2.0 or later.
CVE-2022-25769 affects Mautic versions prior to 4.0.0 and between 4.0.0 and 4.2.0.
If not addressed, CVE-2022-25769 could allow unauthorized execution of PHP files, leading to potential security breaches.
Yes, CVE-2022-25769 is related to incorrect regex in the .htaccess file that fails to restrict access properly to certain PHP files.