Show plain JSON{"id": "CVE-2021-27915", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.0, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.3}, {"type": "Secondary", "source": "security@mautic.org", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.5, "exploitabilityScore": 2.1}]}, "published": "2024-09-17T14:15:14.100", "references": [{"url": "https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422", "tags": ["Vendor Advisory"], "source": "security@mautic.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}, {"type": "Secondary", "source": "security@mautic.org", "description": [{"lang": "en", "value": "CWE-80"}]}], "descriptions": [{"lang": "en", "value": "Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\n\nThis could lead to the user having elevated access to the system."}, {"lang": "es", "value": "Antes de la versi\u00f3n parcheada, existe una vulnerabilidad XSS en los campos de descripci\u00f3n dentro de la aplicaci\u00f3n Mautic que podr\u00eda ser explotada por un usuario registrado de Mautic con los permisos adecuados. Esto podr\u00eda provocar que el usuario tenga acceso elevado al sistema."}], "lastModified": "2024-09-29T00:22:31.787", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71754804-5279-4236-8CE2-434BC23B4A30", "versionEndExcluding": "4.4.12", "versionStartIncluding": "1.0.0"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99718D48-5C19-41C5-84E1-52E95F012830"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B21EB9D-BFCD-4D58-BCA6-3AAE6B3B9041"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C1C106B-1B3D-427D-8147-5527E610F569"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F366E4D8-1515-4E5F-8551-4C8D9E00D0D9"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4234B41-F219-45B7-83A1-8F0F652F2A8B"}, {"criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA028F70-6020-47D6-BEC0-6FC0C7E18420"}], "operator": "OR"}]}], "sourceIdentifier": "security@mautic.org"}