Headline
GHSA-xv68-rrmw-9xwf: Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)
Impact
With access to edit a Mautic form, the attacker can add Cross-Site Scripting stored in the html filed. This could be used to steal sensitive information from the user’s current session.
Patches
Upgrade to 4.4.13 or 5.1.1 or later.
Workarounds
None
References
- https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)
- https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_Scripting
If you have any questions or comments about this advisory:
Email us at [email protected]
Skip to content
Navigation Menu
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
GitHub Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
Explore
- Learning Pathways
- White papers, Ebooks, Webinars
- Customer Stories
- Partners
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Enterprise platform
AI-powered developer platform
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-47058
Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)
Low severity GitHub Reviewed Published Sep 18, 2024 in mautic/mautic • Updated Sep 18, 2024
Package
Affected versions
>= 5.0.0-alpha, < 5.1.1
>= 1.0.0-beta, < 4.4.13
Patched versions
5.1.1
4.4.13
>= 5.0.0-alpha, < 5.1.1
>= 1.0.0-beta, < 4.4.13
Description
Published to the GitHub Advisory Database
Sep 18, 2024
Last updated
Sep 18, 2024