CVE-2022-25769:
Improper regex in htaccess file
9.1
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
-
Published
3/1/2022
Updated
1/11/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
mautic/core | composer | < 3.3.5 | 3.3.5 |
mautic/core | composer | >= 4.0.0, < 4.2.0 | 4.2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from an improper regex pattern in the .htaccess file, which is an Apache configuration file rather than application code. Runtime profilers track executed functions in application code, but the vulnerability exists at the server configuration level where allowed PHP files are determined by path matching. There are no PHP functions in Mautic's codebase that directly handle this regex logic or process input related to this misconfiguration. The exploit would trigger execution of unauthorized PHP files (potentially attacker-controlled), but those files' functions would not be part of Mautic's codebase and thus cannot be identified from the provided patches or advisory details.