First published: Fri Apr 12 2024(Updated: )
### Impact Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability. ### Patches Update to 4.4.12 or 5.0.4 ### Workarounds None ### References - https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/ If you have any questions or comments about this advisory: Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: security@mautic.org security@mautic.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | >=5.0.0-alpha<5.0.4 | 5.0.4 |
composer/mautic/core | >=1.0.0-beta4<4.4.12 | 4.4.12 |
Mautic | >=1.0.1<4.4.12 | |
Mautic | >=5.0.0<5.0.4 | |
Mautic | =1.0.0 | |
Mautic | =1.0.0-beta4 | |
Mautic | =1.0.0-rc1 | |
Mautic | =1.0.0-rc2 | |
Mautic | =1.0.0-rc3 | |
Mautic | =1.0.0-rc4 |
Please update to 4.4.12 or 5.0.4 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25777 is classified with a moderate severity due to the risk of unauthorized access to system files.
To fix CVE-2022-25777, you should update Mautic to version 4.4.12 or 5.0.4.
CVE-2022-25777 is a Server-Side Request Forgery (SSRF) vulnerability.
No, CVE-2022-25777 can only be exploited by authenticated users of Mautic.
Exploitation of CVE-2022-25777 allows an authenticated user to read sensitive system files and access internal addresses.