Improper Access Control Affecting mautic/core-lib package, versions >=1.1.3, <4.4.13>=5.0.0-alpha, <5.1.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MAUTICCORELIB-8056293
  • published19 Sept 2024
  • disclosed18 Sept 2024
  • creditMattias Michaux

Introduced: 18 Sep 2024

CVE-2022-25768  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade mautic/core-lib to version 4.4.13, 5.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Access Control due to the UI upgrade process. An attacker can access the version number or execute parts of the upgrade process without proper permissions.

Note: As upgrading in the user interface is deprecated, this functionality is no longer required.

CVSS Scores

version 4.0
version 3.1