Miggo Logo

CVE-2020-35129: Mautic stored Cross-site Scripting (XSS)

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.68973%
Published
5/24/2022
Updated
5/3/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
mautic/corecomposer< 3.2.43.2.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper input handling in Social Monitoring's title/name fields. The Controller action that processes form submissions (saveAction) and the Entity setter method (setTitle) that persists the data are critical points where input sanitization should occur. The Bishop Fox PoC demonstrates XSS execution via the monitoring[title] parameter, indicating these functions failed to validate()/escape user-controlled input before storage. The stored payloads then render unsafely in dashboard widgets and contact views, enabling privilege escalation attacks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*uti* ***or* *.*.* is *****t** *y stor** XSS. *n *tt**k*r wit* ****ss to So*i*l Monitorin*, *n *ppli**tion ***tur*, *oul* *tt**k ot**r us*rs, in*lu*in* **ministr*tors. *or *x*mpl*, *n *tt**k*r *oul* lo** *n *xt*rn*lly *r**t** J*v*S*ript *il* t**t wo

Reasoning

T** vuln*r**ility st*ms *rom improp*r input **n*lin* in So*i*l Monitorin*'s titl*/n*m* *i*l*s. T** *ontroll*r **tion t**t pro**ss*s *orm su*missions (`s*v***tion`) *n* t** *ntity s*tt*r m*t*o* (`s*tTitl*`) t**t p*rsists t** **t* *r* *riti**l points w