CVE-2026-3105

Source
https://cve.org/CVERecord?id=CVE-2026-3105
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3105.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-3105
Aliases
Published
2026-02-24T20:27:50.713Z
Modified
2026-04-10T05:42:07.540472Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.

MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later.

WorkaroundsNone.

ReferencesIf you have any questions or comments about this advisory:

Email us at security@mautic.org

References

Affected packages

Git / github.com/mautic/mautic

Affected ranges

Type
GIT
Repo
https://github.com/mautic/mautic
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.0.0"
        },
        {
            "fixed": "5.2.10"
        },
        {
            "introduced": "6.0.0"
        },
        {
            "fixed": "6.0.8"
        },
        {
            "introduced": "7.0.0"
        },
        {
            "fixed": "7.0.1"
        }
    ]
}

Affected versions

5.*
5.0.0
5.1.0
5.2.0
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.8
5.2.9
6.*
6.0.0
6.0.1
6.0.2
6.0.3
6.0.4
6.0.5
6.0.6
6.0.7
7.*
7.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3105.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "2.10.0"
            },
            {
                "fixed": "4.4.19"
            }
        ]
    }
]