{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T18:57:35.815","vulnerabilities":[{"cve":{"id":"CVE-2026-3105","sourceIdentifier":"security@mautic.org","published":"2026-02-24T20:27:50.713","lastModified":"2026-02-27T03:11:21.447","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.\n\nMitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later.\n\nWorkaroundsNone.\n\nReferencesIf you have any questions or comments about this advisory:\n\nEmail us at security@mautic.org"},{"lang":"es","value":"Resumen:\nEste aviso aborda una vulnerabilidad de inyección SQL en el endpoint de la API utilizado para recuperar actividades de contacto. Existe una vulnerabilidad en la construcción de la consulta para la línea de tiempo de Actividad de Contacto donde el parámetro responsable de determinar la dirección de ordenación no fue validado estrictamente contra una lista de permitidos, permitiendo potencialmente a usuarios autenticados inyectar comandos SQL arbitrarios a través de la API.\n\nMitigación:\nPor favor, actualice a 4.4.19, 5.2.10, 6.0.8, 7.0.1 o posterior.\n\nSoluciones provisionales:\nNinguna.\n\nReferencias:\nSi tiene alguna pregunta o comentario sobre este aviso:\nEscriba un correo electrónico a security@mautic.org"}],"metrics":{"cvssMetricV31":[{"source":"security@mautic.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@mautic.org","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*","versionStartIncluding":"2.10.0","versionEndExcluding":"4.4.19","matchCriteriaId":"810298B5-F979-4BED-B035-F82C33CB1875"},{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.2.10","matchCriteriaId":"B25B2FE0-300C-44E0-9D0C-7F07C7B44829"},{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.8","matchCriteriaId":"831BD706-7A50-4774-A7D1-403830DDC0ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.0.1","matchCriteriaId":"1CC2F790-64D4-42A3-8435-F6D6B1F62146"}]}]}],"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-r5j5-q42h-fc93","source":"security@mautic.org","tags":["Vendor Advisory","Mitigation"]}]}}]}