{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-25770","assignerOrgId":"4e531c38-7a33-45d3-98dd-d909c0d8852e","state":"PUBLISHED","assignerShortName":"Mautic","dateReserved":"2022-02-22T20:17:36.804Z","datePublished":"2024-09-18T21:26:34.059Z","dateUpdated":"2024-09-19T14:47:14.786Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://packagist.org","defaultStatus":"unaffected","packageName":"mautic/core-lib","product":"Mautic","repo":"https://github.com/mautic/mautic","vendor":"Mautic","versions":[{"lessThan":"< 4.4.13","status":"affected","version":">= 1.0.0-beta3","versionType":"semver"},{"lessThan":"< 5.1.1.","status":"affected","version":">= 5.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Mattias Michaux"},{"lang":"en","type":"remediation reviewer","value":"Zdeno Kuzmany"},{"lang":"en","type":"remediation developer","value":"Mattias Michaux"},{"lang":"en","type":"remediation reviewer","value":"John Linhart"},{"lang":"en","type":"remediation reviewer","value":"Patryk Gruszka"}],"datePublic":"2024-09-18T20:41:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Mautic allows you to update the application via an upgrade script.<br><br>The upgrade logic isn't shielded off correctly, which may lead to vulnerable situation.<br><br>This vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable.<br>"}],"value":"Mautic allows you to update the application via an upgrade script.\n\nThe upgrade logic isn't shielded off correctly, which may lead to vulnerable situation.\n\nThis vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4e531c38-7a33-45d3-98dd-d909c0d8852e","shortName":"Mautic","dateUpdated":"2024-09-18T21:26:34.059Z"},"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-qf6m-6m4g-rmrc"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Upgrade to 4.4.13 or 5.1.1 or higher."}],"value":"Upgrade to 4.4.13 or 5.1.1 or higher."}],"source":{"advisory":"GHSA-qf6m-6m4g-rmrc","discovery":"INTERNAL"},"title":"Insufficient authentication in upgrade flow","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-19T14:47:02.190322Z","id":"CVE-2022-25770","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-19T14:47:14.786Z"}}]}}