
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25769 affects Mautic versions prior to 3.3.5 and 4.2.0. The vulnerability was discovered in the default .htaccess file configuration where restrictions on PHP file execution in the root of the application were improperly implemented. The issue was disclosed on February 28, 2022, and has been assigned a moderate severity rating (GitHub Advisory).
The vulnerability stems from an incorrect regex implementation in the second FilesMatch directive within the .htaccess file. The regex only validates the filename without considering the full path, creating a security weakness. This issue has been classified under CWE-284 (Improper Access Control) (GitHub Advisory).
The improper regex implementation in the .htaccess file could potentially allow unauthorized execution of PHP files in the application, bypassing intended access restrictions (GitHub Advisory).
Users are advised to upgrade to Mautic versions 3.3.5 or 4.2.0 which contain the security fix. No alternative workarounds have been provided (Mautic Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."