First published: Fri Apr 12 2024(Updated: )
### Impact Prior to the patched version, logged in users of Mautic are able to access areas of the application that they should be prevented from accessing. Users could potentially access sensitive data such as names and surnames, company names and stage names. ### Patches Update to 4.4.12 and 5.0.4 ### Workarounds No ### References https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | >=5.0.0-alpha<5.0.4 | 5.0.4 |
composer/mautic/core | >=1.0.2<4.4.12 | 4.4.12 |
Mautic | >=1.0.2<4.4.12 | |
Mautic | >=5.0.0<5.0.4 |
Update to 4.4.12 or 5.0.4 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-25776 is considered high due to its potential impact on sensitive data access.
To fix CVE-2022-25776, you should update Mautic to version 5.0.4 or 4.4.12.
Logged in users of Mautic versions prior to 4.4.12 and 5.0.4 are affected by CVE-2022-25776.
Due to CVE-2022-25776, users may gain unauthorized access to sensitive information including names, company names, and stage names.
Yes, patches for CVE-2022-25776 have been released in versions 4.4.12 and 5.0.4 of Mautic.