Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. mautic/core
  4. ›
  5. CVE-2024-47055

CVE-2024-47055: Mautic segment cloning doesn't have a proper permission check

May 28, 2025

This advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks.

Insecure Direct Object Reference (IDOR) / Missing Authorization: A missing authorization vulnerability exists in the cloneAction of the segment management. This allows an authenticated user to bypass intended permission restrictions and clone segments even if they lack the necessary permissions to create new ones.

References

  • github.com/advisories/GHSA-vph5-ghq3-q782
  • github.com/mautic/mautic
  • github.com/mautic/mautic/security/advisories/GHSA-vph5-ghq3-q782
  • nvd.nist.gov/vuln/detail/CVE-2024-47055

Code Behaviors & Features

Detect and mitigate CVE-2024-47055 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0-alpha before 5.2.6, all versions starting from 6.0.0-alpha before 6.0.2

Fixed versions

  • 5.2.6
  • 6.0.2

Solution

Upgrade to versions 5.2.6, 6.0.2 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

packagist/mautic/core/CVE-2024-47055.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:51 +0000.