
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25768 is a security vulnerability discovered in Mautic's core package that affects versions 1.1.3 and later. The vulnerability was disclosed on September 18, 2024, and involves improper access control in the UI upgrade process. This security issue impacts the update functionality accessible through Mautic's user interface (GitHub Advisory).
The vulnerability has been assigned a High severity rating with a CVSS v3.1 score of 7.0. The CVSS vector string is AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H, indicating that it is exploitable over the network, requires high attack complexity, needs no privileges or user interaction, and has potential impacts on confidentiality, integrity, and availability. The core issue lies in the lack of access control verification for tasks related to the update process (GitHub Advisory).
The vulnerability could allow an attacker to access the Mautic version number or execute parts of the upgrade process without proper authorization. This poses a significant security risk as it could potentially lead to unauthorized system modifications and compromise the system's integrity (GitHub Advisory).
The vulnerability has been patched in versions 4.4.13 and 5.1.1. Users are advised to upgrade to these versions or later to address the security issue. No workarounds are available, making the upgrade the only solution to mitigate this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."