{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T12:19:30.081","vulnerabilities":[{"cve":{"id":"CVE-2022-25769","sourceIdentifier":"security@mautic.org","published":"2024-09-18T15:15:13.060","lastModified":"2025-02-27T22:11:36.723","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"ImpactThe default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.\n\nThis logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path."},{"lang":"es","value":"ImpactoEl archivo .htaccess predeterminado tiene algunas restricciones en el acceso a los archivos PHP para permitir que solo se ejecuten archivos PHP específicos en la raíz de la aplicación. Esta lógica no es correcta, ya que la expresión regular en el segundo FilesMatch solo verifica el nombre del archivo, no la ruta completa."}],"metrics":{"cvssMetricV31":[{"source":"security@mautic.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@mautic.org","type":"Secondary","description":[{"lang":"en","value":"CWE-1284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.5","matchCriteriaId":"F33A1516-0712-4E64-B354-76D6E8BDD475"},{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.2.0","matchCriteriaId":"0239CC52-7B9C-4F8B-AF78-7B66C7CB914A"}]}]}],"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56","source":"security@mautic.org","tags":["Vendor Advisory"]},{"url":"https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic","source":"security@mautic.org","tags":["Release Notes"]}]}}]}