Exposure of Sensitive System Information to an Unauthorized Control Sphere Affecting mautic/core-lib package, versions <5.2.6>=6.0.0-alpha, <6.0.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MAUTICCORELIB-10260414
  • published29 May 2025
  • disclosed28 May 2025
  • creditr3ky

Introduced: 28 May 2025

NewCVE-2024-47056  (opens in a new tab)
CWE-312  (opens in a new tab)
CWE-497  (opens in a new tab)
CWE-526  (opens in a new tab)

How to fix?

Upgrade mautic/core-lib to version 5.2.6, 6.0.2 or higher.

Overview

Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere due to improper server configuration that fails to restrict access to sensitive files. An attacker can view sensitive configuration data, including database credentials and API keys, by navigating to the URL of the .env file.

Workaround

This vulnerability can be mitigated by ensuring the web server is configured to deny access to .env files. For Apache, ensure that .htaccess files are enabled and properly configured. For Nginx, add a configuration block to deny access to .env files and reload or restart the Nginx service.

References

CVSS Base Scores

version 4.0
version 3.1