Miggo Logo

CVE-2022-25770: Mautic has insufficient authentication in upgrade flow

7.8

CVSS Score
3.1

Basic Information

EPSS Score
0.30919%
Published
9/18/2024
Updated
2/21/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
mautic/corecomposer>= 1.0.0-beta3, < 4.4.134.4.13
mautic/corecomposer>= 5.0.0-alpha, < 5.1.15.1.1
mautic/core-libcomposer>= 1.0.0-beta3, < 4.4.134.4.13
mautic/core-libcomposer>= 5.0.0-alpha, < 5.1.15.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from upgrade.php being accessible in the web root without authentication. This file contained critical upgrade functions that: 1) Perform file system operations (move_mautic_* functions) 2) Modify system components 3) Clear application cache. The commit fixes this by removing upgrade.php from web-accessible locations and moving it to protected scaffolding directories. The CWE-306 mapping confirms these functions lacked required authentication for critical upgrade operations. The patch's removal of web-root access to upgrade.php and modification of build scripts to use protected paths directly addresses the authentication bypass vulnerability in these functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t M*uti* *llows you to up**t* t** *ppli**tion vi* *n up*r*** s*ript. T** up*r*** lo*i* isn't s*i*l*** o** *orr**tly, w*i** m*y l*** to vuln*r**l* situ*tion. T*is vuln*r**ility is miti**t** *y t** ***t t**t M*uti* n***s to ** inst*ll** in

Reasoning

T** vuln*r**ility st*ms *rom up*r***.p*p **in* ****ssi*l* in t** w** root wit*out *ut**nti**tion. T*is *il* *ont*in** *riti**l up*r*** *un*tions t**t: *) P*r*orm *il* syst*m op*r*tions (mov*_m*uti*_* *un*tions) *) Mo*i*y syst*m *ompon*nts *) *l**r *p