Home

Description

SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference (IDOR) / Missing Authorization: A missing authorization vulnerability exists in the cloneAction of the segment management. This allows an authenticated user to bypass intended permission restrictions and clone segments even if they lack the necessary permissions to create new ones. MitigationUpdate Mautic to a version that implements proper authorization checks for the cloneAction within the ListController.php. Ensure that users attempting to clone segments possess the appropriate creation permissions.

PUBLISHED Reserved 2024-09-17 | Published 2025-05-28 | Updated 2025-05-29 | Assigner Mautic




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

> 5.0.0 (semver) before < 5.2.6, < 6.0.2
affected

Credits

Abhisek Mazumdar finder

Abhisek Mazumdar reporter

Patryk Gruszka remediation reviewer

Abhisek Mazumdar remediation developer

Nick Vanpraet remediation developer

References

github.com/...mautic/security/advisories/GHSA-vph5-ghq3-q782

cve.org (CVE-2024-47055)

nvd.nist.gov (CVE-2024-47055)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.