We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack. MitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence.
Reserved 2024-09-17 | Published 2025-05-28 | Updated 2025-05-29 | Assigner MauticCWE-203 Observable Discrepancy
Tomasz Kowalczyk
Patryk Gruszka
Nick Vanpraet
Tomasz Kowalczyk
github.com/...mautic/security/advisories/GHSA-424x-cxvh-wq9p
Support options