Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r5j5-q42h-fc93

Опубликовано: 25 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 7.6

Описание

Mautic is Vulnerable to SQL Injection through Contact Activity API Sorting

Summary

This advisory addresses a SQL Injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.

Mitigation

Please update to 5.2.10, 6.0.8, 7.0.1 or later.

Workarounds

None.

References

If there are any questions or comments about this advisory:

Email Mautic at security@mautic.org

Пакеты

Наименование

mautic/core

composer
Затронутые версииВерсия исправления

>= 2.10.0, < 5.2.10

5.2.10

Наименование

mautic/core

composer
Затронутые версииВерсия исправления

>= 6.0.0-alpha, < 6.0.8

6.0.8

Наименование

mautic/core

composer
Затронутые версииВерсия исправления

>= 7.0.0-alpha, < 7.0.1

7.0.1

EPSS

Процентиль: 13%
0.00043
Низкий

7.6 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.6
nvd
около 2 месяцев назад

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API. MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later. WorkaroundsNone. ReferencesIf you have any questions or comments about this advisory: Email us at security@mautic.org

EPSS

Процентиль: 13%
0.00043
Низкий

7.6 High

CVSS3

Дефекты

CWE-89