Логотип exploitDog
bind:CVE-2026-3105
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-3105

Количество 2

Количество 2

nvd логотип

CVE-2026-3105

около 2 месяцев назад

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API. MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later. WorkaroundsNone. ReferencesIf you have any questions or comments about this advisory: Email us at security@mautic.org

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-r5j5-q42h-fc93

около 1 месяца назад

Mautic is Vulnerable to SQL Injection through Contact Activity API Sorting

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-3105

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API. MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later. WorkaroundsNone. ReferencesIf you have any questions or comments about this advisory: Email us at security@mautic.org

CVSS3: 7.6
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-r5j5-q42h-fc93

Mautic is Vulnerable to SQL Injection through Contact Activity API Sorting

CVSS3: 7.6
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу