We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47055

Segment cloning doesn't have a proper permission check



Description

SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference (IDOR) / Missing Authorization: A missing authorization vulnerability exists in the cloneAction of the segment management. This allows an authenticated user to bypass intended permission restrictions and clone segments even if they lack the necessary permissions to create new ones. MitigationUpdate Mautic to a version that implements proper authorization checks for the cloneAction within the ListController.php. Ensure that users attempting to clone segments possess the appropriate creation permissions.

Reserved 2024-09-17 | Published 2025-05-28 | Updated 2025-05-29 | Assigner Mautic


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

> 5.0.0 before < 5.2.6, < 6.0.2
affected

Credits

Abhisek Mazumdar finder

Abhisek Mazumdar reporter

Patryk Gruszka remediation reviewer

Abhisek Mazumdar remediation developer

Nick Vanpraet remediation developer

References

github.com/...mautic/security/advisories/GHSA-vph5-ghq3-q782

cve.org (CVE-2024-47055)

nvd.nist.gov (CVE-2024-47055)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-47055

Support options

Helpdesk Chat, Email, Knowledgebase