-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mautic/core | composer | >= 1.0.2, < 4.4.12 | 4.4.12 |
| mautic/core | composer | >= 5.0.0-alpha, < 5.0.4 | 5.0.4 |
The vulnerability stems from missing permission checks in controller actions. The commit patches explicitly added checks for specific permissions (e.g., 'lead:leads:viewown', 'user:users:view') in these functions. The pre-patch versions of these functions did not enforce these checks, allowing authenticated users to access restricted endpoints and sensitive data. The added functional tests in the commit (e.g., CompanyControllerTest, LeadControllerTest) validate() that unauthorized users are now blocked, confirming the original vulnerability.
KEV Misses 88% of Exploited CVEs- Get the report