Vulnerability Details CVE-2026-3105
SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.
MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later.
WorkaroundsNone.
ReferencesIf you have any questions or comments about this advisory:
Email us at security@mautic.org
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 10.9%
CVSS Severity
CVSS v3 Score 7.6
Products affected by CVE-2026-3105
-
cpe:2.3:a:acquia:mautic:2.10.0
-
cpe:2.3:a:acquia:mautic:2.10.1
-
cpe:2.3:a:acquia:mautic:2.11.0
-
cpe:2.3:a:acquia:mautic:2.12.0
-
cpe:2.3:a:acquia:mautic:2.12.1
-
cpe:2.3:a:acquia:mautic:2.12.2
-
cpe:2.3:a:acquia:mautic:2.13.0
-
cpe:2.3:a:acquia:mautic:2.13.1
-
cpe:2.3:a:acquia:mautic:2.14.0
-
cpe:2.3:a:acquia:mautic:2.14.1
-
cpe:2.3:a:acquia:mautic:2.14.2
-
cpe:2.3:a:acquia:mautic:2.15.0
-
cpe:2.3:a:acquia:mautic:2.15.1
-
cpe:2.3:a:acquia:mautic:2.15.2
-
cpe:2.3:a:acquia:mautic:2.16.5
-
cpe:2.3:a:acquia:mautic:3.0.0
-
cpe:2.3:a:acquia:mautic:3.0.1
-
cpe:2.3:a:acquia:mautic:3.0.2
-
cpe:2.3:a:acquia:mautic:3.1.0
-
cpe:2.3:a:acquia:mautic:3.1.1
-
cpe:2.3:a:acquia:mautic:3.1.2
-
cpe:2.3:a:acquia:mautic:3.2.0
-
cpe:2.3:a:acquia:mautic:3.2.1
-
cpe:2.3:a:acquia:mautic:3.2.2
-
cpe:2.3:a:acquia:mautic:3.2.3
-
cpe:2.3:a:acquia:mautic:3.2.4
-
cpe:2.3:a:acquia:mautic:3.2.5
-
cpe:2.3:a:acquia:mautic:3.3.0
-
cpe:2.3:a:acquia:mautic:3.3.1
-
cpe:2.3:a:acquia:mautic:3.3.2
-
cpe:2.3:a:acquia:mautic:3.3.3
-
cpe:2.3:a:acquia:mautic:3.3.4
-
cpe:2.3:a:acquia:mautic:3.3.5
-
cpe:2.3:a:acquia:mautic:4.0.0
-
cpe:2.3:a:acquia:mautic:4.0.1
-
cpe:2.3:a:acquia:mautic:4.0.2
-
cpe:2.3:a:acquia:mautic:4.1.0
-
cpe:2.3:a:acquia:mautic:4.1.1
-
cpe:2.3:a:acquia:mautic:4.1.2
-
cpe:2.3:a:acquia:mautic:4.2.0
-
cpe:2.3:a:acquia:mautic:4.2.1
-
cpe:2.3:a:acquia:mautic:4.2.2
-
cpe:2.3:a:acquia:mautic:4.3.0
-
cpe:2.3:a:acquia:mautic:4.3.1
-
cpe:2.3:a:acquia:mautic:4.4.0
-
cpe:2.3:a:acquia:mautic:4.4.1
-
cpe:2.3:a:acquia:mautic:4.4.10
-
cpe:2.3:a:acquia:mautic:4.4.11
-
cpe:2.3:a:acquia:mautic:4.4.12
-
cpe:2.3:a:acquia:mautic:4.4.13
-
cpe:2.3:a:acquia:mautic:4.4.2
-
cpe:2.3:a:acquia:mautic:4.4.3
-
cpe:2.3:a:acquia:mautic:4.4.4
-
cpe:2.3:a:acquia:mautic:4.4.5
-
cpe:2.3:a:acquia:mautic:4.4.6
-
cpe:2.3:a:acquia:mautic:4.4.7
-
cpe:2.3:a:acquia:mautic:4.4.8
-
cpe:2.3:a:acquia:mautic:4.4.9
-
cpe:2.3:a:acquia:mautic:5.0.0
-
cpe:2.3:a:acquia:mautic:5.0.1
-
cpe:2.3:a:acquia:mautic:5.0.2
-
cpe:2.3:a:acquia:mautic:5.0.3
-
cpe:2.3:a:acquia:mautic:5.0.4
-
cpe:2.3:a:acquia:mautic:5.1.0
-
cpe:2.3:a:acquia:mautic:5.1.1
-
cpe:2.3:a:acquia:mautic:5.2.0
-
cpe:2.3:a:acquia:mautic:5.2.1
-
cpe:2.3:a:acquia:mautic:5.2.2
-
cpe:2.3:a:acquia:mautic:5.2.3
-
cpe:2.3:a:acquia:mautic:5.2.4
-
cpe:2.3:a:acquia:mautic:5.2.5
-
cpe:2.3:a:acquia:mautic:5.2.6
-
cpe:2.3:a:acquia:mautic:5.2.7
-
cpe:2.3:a:acquia:mautic:5.2.8
-
cpe:2.3:a:acquia:mautic:6.0.0
-
cpe:2.3:a:acquia:mautic:6.0.1
-
cpe:2.3:a:acquia:mautic:6.0.2
-
cpe:2.3:a:acquia:mautic:6.0.3
-
cpe:2.3:a:acquia:mautic:6.0.4
-
cpe:2.3:a:acquia:mautic:6.0.5
-
cpe:2.3:a:acquia:mautic:6.0.6
-
cpe:2.3:a:acquia:mautic:7.0.0