PT-2026-21791 · Mautic · Mautic
Escopecz
+2
·
Published
2026-02-24
·
Updated
2026-03-25
·
CVE-2026-3105
CVSS v3.1
8.8
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Mautic versions prior to 4.4.19
Mautic versions prior to 5.2.10
Mautic versions prior to 6.0.8
Mautic versions prior to 7.0.1
Description
A SQL injection issue exists in the API endpoint used for retrieving contact activities. The vulnerability is due to insufficient validation of the parameter controlling sort direction in the query construction for the Contact Activity timeline. This could allow authenticated users to inject arbitrary SQL commands via the API. The vulnerable parameter is not explicitly identified.
Recommendations
Update to version 4.4.19 or later.
Update to version 5.2.10 or later.
Update to version 6.0.8 or later.
Update to version 7.0.1 or later.
Fix
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Mautic