SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API. MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later. WorkaroundsNone. ReferencesIf you have any questions or comments about this advisory: Email us at security@mautic.org
History

Sat, 28 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
First Time appeared Acquia
Acquia mautic
CPEs cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
Vendors & Products Acquia
Acquia mautic

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mautic
Mautic mautic
Vendors & Products Mautic
Mautic mautic

Tue, 24 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API. MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later. WorkaroundsNone. ReferencesIf you have any questions or comments about this advisory: Email us at security@mautic.org
Title SQL Injection in Contact Activity API Sorting
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mautic

Published: 2026-02-24T18:39:03.352Z

Updated: 2026-02-26T20:07:06.187Z

Reserved: 2026-02-24T10:36:40.356Z

Link: CVE-2026-3105

cve-icon Vulnrichment

Updated: 2026-02-26T20:06:54.809Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T20:27:50.713

Modified: 2026-02-27T03:11:21.447

Link: CVE-2026-3105

cve-icon Redhat

No data.