Skip to content

Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)

Low severity GitHub Reviewed Published Sep 18, 2024 in mautic/mautic • Updated Sep 19, 2024

Package

composer mautic/core (Composer)

Affected versions

>= 5.0.0-alpha, < 5.1.1
>= 1.0.0-beta, < 4.4.13

Patched versions

5.1.1
4.4.13
composer mautic/core-lib (Composer)
>= 5.0.0-alpha, < 5.1.1
>= 1.0.0-beta, < 4.4.13
5.1.1
4.4.13

Description

Impact

With access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user's current session.

Patches

Upgrade to 4.4.13 or 5.1.1 or later.

Workarounds

None

References

If you have any questions or comments about this advisory:

Email us at [email protected]

References

@RCheesley RCheesley published to mautic/mautic Sep 18, 2024
Published by the National Vulnerability Database Sep 18, 2024
Published to the GitHub Advisory Database Sep 18, 2024
Reviewed Sep 18, 2024
Last updated Sep 19, 2024

Severity

Low

EPSS score

0.043%
(10th percentile)

Weaknesses

CVE ID

CVE-2024-47058

GHSA ID

GHSA-xv68-rrmw-9xwf

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.