{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3105","assignerOrgId":"4e531c38-7a33-45d3-98dd-d909c0d8852e","state":"PUBLISHED","assignerShortName":"Mautic","dateReserved":"2026-02-24T10:36:40.356Z","datePublished":"2026-02-24T18:39:03.352Z","dateUpdated":"2026-02-26T20:07:06.187Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://packagist.org","defaultStatus":"unaffected","packageName":"mautic/core","product":"Mautic","repo":"https://github.com/mautic/mautic","vendor":"Mautic","versions":[{"lessThan":"< 4.4.19 <5.2.10 <6.0.8 <7.0.1","status":"affected","version":">= 2.10.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"q1uf3ng"},{"lang":"en","type":"remediation developer","value":"parykgruszka"},{"lang":"en","type":"remediation reviewer","value":"escopecz"},{"lang":"en","type":"sponsor","value":"Leuchtfeuer Digital Marketing"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<h3>Summary</h3><p>This advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.</p><h3>Mitigation</h3><p>Please update to <strong>4.4.19</strong>, <strong>5.2.10</strong>, <strong>6.0.8</strong>, <strong>7.0.1</strong>&nbsp;or later.</p><h3>Workarounds</h3><p>None.</p><h3>References</h3><p>If you have any questions or comments about this advisory:</p><p>Email us at <a target=\"_blank\" rel=\"nofollow\">security@mautic.org</a></p><br>"}],"value":"SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.\n\nMitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later.\n\nWorkaroundsNone.\n\nReferencesIf you have any questions or comments about this advisory:\n\nEmail us at security@mautic.org"}],"impacts":[{"capecId":"CAPEC-66","descriptions":[{"lang":"en","value":"CAPEC-66 SQL Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4e531c38-7a33-45d3-98dd-d909c0d8852e","shortName":"Mautic","dateUpdated":"2026-02-24T18:39:03.352Z"},"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-r5j5-q42h-fc93"}],"source":{"advisory":"GHSA-r5j5-q42h-fc93","discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2026-02-15T13:38:00.000Z","value":"Report received"},{"lang":"en","time":"2026-02-18T09:27:00.000Z","value":"Report accepted"},{"lang":"en","time":"2026-02-24T14:55:00.000Z","value":"Advisory published"}],"title":"SQL Injection in Contact Activity API Sorting","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-26T20:02:03.863722Z","id":"CVE-2026-3105","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T20:07:06.187Z"}}]}}