First published: Wed Sep 18 2024(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-qf6m-6m4g-rmrc. This link is maintained to preserve external references. # Original Description Mautic allows you to update the application via an upgrade script. The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation. This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core-lib | >=5.0.0-alpha<5.1.1 | 5.1.1 |
composer/mautic/core-lib | >=1.0.0-beta3<4.4.13 | 4.4.13 |
composer/mautic/core | >=5.0.0-alpha<5.1.1 | 5.1.1 |
composer/mautic/core | >=1.0.0-beta3<4.4.13 | 4.4.13 |
composer/mautic/core | >=5.0.0<5.1.1 | 5.1.1 |
Mautic | >=1.0.1<4.4.13 | |
Mautic | >=5.0.0<5.1.1 | |
Mautic | =1.0.0 | |
Mautic | =1.0.0-beta3 | |
Mautic | =1.0.0-beta4 | |
Mautic | =1.0.0-rc1 | |
Mautic | =1.0.0-rc2 | |
Mautic | =1.0.0-rc3 | |
Mautic | =1.0.0-rc4 | |
>=1.0.1<4.4.13 | ||
>=5.0.0<5.1.1 | ||
=1.0.0 | ||
=1.0.0-beta3 | ||
=1.0.0-beta4 | ||
=1.0.0-rc1 | ||
=1.0.0-rc2 | ||
=1.0.0-rc3 | ||
=1.0.0-rc4 |
Upgrade to 4.4.13 or 5.1.1 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25770 is considered a moderate severity vulnerability due to the specific conditions required for exploitation.
To mitigate CVE-2022-25770, upgrade Mautic to version 5.1.1 or 4.4.13.
CVE-2022-25770 may allow unauthorized upgrades leading to potential application vulnerabilities if installed improperly.
Versions of Mautic from 5.0.0 up to 5.1.1 and from 1.0.0-beta3 up to 4.4.13 are affected by CVE-2022-25770.
Exploitation of CVE-2022-25770 requires specific system configurations, making it less common.